Showing results for: Security

1042 results found
Cyber Security Awareness Days Worldwide
April 25, 2022

Top 10 Cyber Security Awareness Days Worldwide

Cyber security awareness is the sine qua non of working life for both individual and corporate users. Everyone must follow certain practices from head to toe to protect private life and privacy, company information, and… Continue Reading

April 25, 2022

Event – InfoSecurity Europe 2022

INFOSECURITY 2022 21-23 June, 2022 Join SOCRadar in-person! Set up time to meet with us at InfoSecurity Europe and experience early cyber threat warning system powered with External Attack Surface management for 30 days for free! Europe is the meeting place for the industry’s finest minds. Our SOCRadar team will be onsite and available to meet with you in… Continue Reading

What are the Different Types of Attacks in Cybersecurity?
April 18, 2022

What are the Different Types of Attacks in Cybersecurity?

A cyber attack is a sort of attack that uses numerous tactics to target computer systems, infrastructures, networks, or personal computer devices. Cyber attacks come in many flavors, each capable of attacking a specific computer… Continue Reading

Comparing Benefits from Different Security Monitoring Services
April 18, 2022

Comparing Benefits from Different Security Monitoring Services

By 2021, it is estimated that the total cost of cybercrime was 6 trillion USD making threat actors the third-largest economy after the U.S. and China. McAfee states cybercrimes accounted for 14% of the entire… Continue Reading

What Do You Need To Know About Cybersecurity in Power Grids
April 15, 2022

What Do You Need To Know About Cybersecurity in Power Grids

Cyberattacks on the electrical power system are becoming as disruptive as natural disasters, and the danger is growing as power grids become more connected and smarter. Unlike in the past, when a power outage impacted… Continue Reading

What are the Biggest Cybersecurity Risks in North America?
April 6, 2022

What are the Biggest Cybersecurity Risks in North America?

The ongoing Russian invasion attempt of Ukraine has changed priorities on the global cyberattack surface. Experts talk about the necessity of putting forward a renewed cyber security strategy, both at the country, organization, and sector… Continue Reading

March 31, 2022

What Cyber Security Experts Think: How to Make Money on the Dark Web?

People increasingly purchase and sell items in the Internet's most obscure corners. Amazon, Shopify, Walmart, and eBay are all well-known e-commerce platforms. These are frequently the first internet stores where we purchase our goods. However,… Continue Reading

What is Cybersecurity in 2022?
March 23, 2022

Let’s Start from the Beginning: What is Cybersecurity in 2022?

The practice of securing critical systems and sensitive data from digital threats is known as cybersecurity. Cybersecurity, also known as IT security, prevent threats to networked systems and applications, whether they come from within or… Continue Reading

March 10, 2022

ISO 27002 and Threat Intelligence: The New Security Standard

ISO 27000 series and their importance  ISO 27000 series consist of the standards determined by the International Organization for Standardization (ISO). It offers the best approaches for information security management systems (ISMS), focusing on controlling… Continue Reading

Future of Cybersecurity in the Era of Metaverse
March 4, 2022

Future of Cybersecurity in the Era of Metaverse

Metaverse has become a subject that everyone is curious about very soon after it has found its place in the titles. It was claimed that the term, which caused great excitement among those working in… Continue Reading

January 17, 2022

What is a Security Operations Center (SOC)? (Ultimate Guide)

A Security Operation Center (SOC) is a centralized function inside an organization that uses people, processes, and technology to continually monitor and enhance an organization’s security posture while preventing, detecting, analyzing, and responding to cybersecurity… Continue Reading

January 12, 2022

How Does Cyber Security Support Business Intelligence?

The second guide that we have prepared for cyber security experts and administrators is about “business intelligence”. Cybercrime has catastrophic consequences in today's corporate environment, including revenue and profit loss, brand ruin, erosion of consumer… Continue Reading

January 11, 2022

Using Artificial Intelligence in Cybersecurity (Ultimate Guide)

Welcome to the first of our ultimate guides on some topics related to cybersecurity: AI vs. cybersecurity. In these compilations, we will try to answer the questions that come to mind about some hot issues.… Continue Reading

Critical Auth Bypass Vulnerabilities: SonicWall Urges Immediate Patching for GMS/Analytics
January 10, 2022

SonicWall Patches Y2K22 Bug in Email Security

Maybe you remember the Y2K problem, a problem that refers to a computer glitch identified in some software systems that could have disrupted the transition from the year 1999 to 2000. It looks like reappeared… Continue Reading

cyberspace search engine
September 14, 2021

Top 5 Cyberspace Search Engines Used by Security Researchers

We are all familiar with the concept of internet search engines such as Google, Bing, Safari, and even Yahoo. But what if you looking for information that is deeper than the capabilities of these search engines?… Continue Reading

April 26, 2021

10 Things You Need to Know About CSM (Continuous Security Monitoring) for SOC Environments

Defense teams are switching from preventative ideology to early detection and rapid reaction in order to confront attackers. Security teams will quickly catch and interrupt criminals and remove risks before they destroy the infrastructure of… Continue Reading

February 8, 2021

CTI is So Critical to SOC Teams for DNS Security

Google reported that it served more than 400 billion DNS queries per day.[1] Furthermore, Let’s Encrypt issues around 600,000 digital certificates per day. These statistics alone can show how critical DNS security is. Many monitoring… Continue Reading

January 6, 2021

2020: The Year in Cybersecurity

One of the trends in cybersecurity that should be noted is the continuing need to further improve the relevant cybersecurity rules. As technology companies operate with big data, it is up to cybersecurity experts to… Continue Reading

December 6, 2020

How Pandemic Affected Information Security

New work order: Remote workforce The COVID-19 virus, which emerged in the last months of 2019 and caused the announcement of a pandemic, led to a sudden change in daily norms for companies and employees,… Continue Reading

SOCRadar helps you visualize digital risk, and reduce your company's attack surface
Request Demo