What is Security Operations Center (SOC)?

Security Operations Center (SOC)_

Introduction A security operations centre (SOC) is a facility that houses an information security team responsible for monitoring and analyzing an organization’s security posture on an ongoing basis. The SOC team’s goal is to detect, analyze, and respond to cybersecurity incidents using a combination of technology solutions and a strong set of processes. Security operations […]

Cyber Threat Intelligence v2.0

cyber threat intelligence

Introduction Cyber threat intelligence refers to a dynamic, adaptive technology that leverages large-scale threat history data to proactively block and remediate future malicious attacks on a network. Cyber threat intelligence itself is not a solution, but it is a crucial security architecture component. Because of evolving threats, security solutions are only as effective as the […]

Incident Management

Incident Management

What is Incident Management? Security incident management is the process of identifying, managing, recording and analyzing security threats or incidents in real-time. It seeks to give a robust and comprehensive view of any security issues within an IT infrastructure. A security incident can be anything from an active threat to an attempted intrusion to a […]

Artificial Intelligence in Cybersecurity

Artificial Intelligence in Cyber Security

Introduction Artificial Intelligence is ideally suited to solve some of our most difficult problems, and cybersecurity certainly falls into that category. With today’s ever evolving cyber-attacks and proliferation of devices, machine learning and AI can be used to “keep up with the bad guys,” automating threat detection and respond more efficiently than traditional software-driven approaches. […]

Juice Jacking – A Concise Overview

  What is Juice Jacking? Juice jacking is a type of cyber attack where you unknowingly plug in your mobile or electronic device into a USB port that is infected with malware which then gets loaded on the phone once a connection is made. This malware can violate your privacy by gaining direct access to […]

Cyber Weekly 42-2022

This week’s latest Cybersecurity updates Bolster Raises $15 Million to Tackle Fakes and Frauds. Keystone Health Data Breach Impacts 235,000 Patients. WordPress Security Update 6.0.3 Patches 16 Vulnerabilities. Google’s GUAC Open-Source Tool Centralizes Software Security Metadata. FBI Warns of Iranian Cyber Firm’s Hack-and-Leak Operations. Critical Flaw Reported in Move Virtual Machine Powering the Aptos Blockchain […]