Fundamental of Cyber Resilience & How It Affects SOC Services?
Introduction The Security Operation Centre (SOC) is the backbone of every organization’s security defenses. Back in the day, the SOC focused mainly on fulfilling…
Five Steps To Help You Prepare For Threat Hunting
Cybercriminals are very cunning and use stealthy human-led techniques with malicious intentions to carry out attacks. In the last year, around 59% of organizations have…
3 Must-Haves in Your Cybersecurity Incident Response Plan
Cyber-attacks never issue any prior intimation or warning; it just happens anytime. Basically, with cybersecurity incidents, it is a matter of “when” rather than “if.”…
Security Threat Intelligence Standards – STIX and TAXII
Introduction: Security Threat Intelligence Standards (STIX and TAXII) make day-to-day SOC operations go uninterrupted with a shared strategy that provides a collaborative response to cybersecurity…
Security Orchestration Automation and Response (SOAR)
Cybersecurity Synopsis For almost every organization, either large or small-scale, performing incident response is an endless job and to tackle it adequately, most of the…
Categories
- Android Security (19)
- Application security (1)
- Authentication & Authorization (23)
- Blockchain Security (1)
- Bug Bounty (2)
- BYOD (5)
- Case Study (29)
- Chatbot Security (1)
- Cloud Security (14)
- Containerization Security (1)
- Corporate Training (6)
- Cyber Attack (34)
- Cybersecurity Frameworks and Solutions (3)
- Data Breaches (35)
- Data Leakage (27)
- Data Privacy (29)
- Email Phishing (8)
- Encryption & Cryptography (14)
- Ethical Hacking (19)
- General (42)
- Governance Risk & Compliance (8)
- iOS Security (2)
- IOT Security (7)
- Java Security (2)
- Mobile Application Security (19)
- Mobile Device Management (10)
- Network Pentesting (9)
- News (48)
- Password Security (10)
- Past Events (8)
- Patch Management (3)
- Ransomware Attack (14)
- Reverse Engineering (3)
- Secure SDLC (5)
- Security Advisory (34)
- Security Best Practices (43)
- Security Hardening (38)
- Social Engineering Attack (10)
- Social Networking Security (5)
- Source Code Review (2)
- SPAM (2)
- Student Oriented Courses (2)
- Thick Client Penetration Testing (4)
- Unix/Linux Security (1)
- Upcoming Events (3)
- Viruses & Malware (16)
- VoIP Penetration Testing (4)
- Vulnerability Disclosure (21)
- Web Application Security (34)
- Windows Mobile Security (1)
- Zero Day Attack (8)