Five challenges SOC teams face everyday
Security Operations Center (SOC) around the world are watching over critical ...
Why cost is a barrier to good THREAT detection
It was Q3 of 2018, when we were running surveys across the globe, talking to analysts and ...
What are the best measures to avoid APT attacks?
Advanced persistent threats (APTs) are cyber attacks that have the potential to cause the ...
What is ransomware and how does it work?
Ransomware is a type of malicious software or malware that restricts access to computer ...
It's time to modernize your SOC
Today’s Security Operations Centre (SOC) needs the right tools along with the right ...
Protect Your Systems From Within - An Introduction To Insider Threats
Is your cybersecurity plan focused only on external threats? Do you not consider issues ...
Announcement: DNIF Query Language Support Added to Sigma Rules
We are happy to share that our engineering team has contributed a translation backend for ...
Return of BlackByte Ransomware
On February 11, 2022, FBI and Unites States Secret Service (USSS) released a joint ...
Demystifying The CERT-IN Direction
CERT-In is a nodal agency within the Ministry of Electronics and Information Technology ...
CISO Roadmap: What to Prioritise in Your First 90 Days as a CISO
The role of CISO is more important than ever in this digital age. Given the increasing ...