Najnowsze publikacje

EDR vs XDR

Cybersecurity tools like Endpoint Detection and Response (EDR) and Extended Detection and Response (XDR) are made to assist organizations in detecting and preventing cyber threats.

GLOBSEC 2023 Bratislava Forum

Like last year, the prestigious international security conference GLOBSEC 2023 Bratislava Forum was held in Bratislava, which was attended by several well-known guests, including the highest state representatives of France, Ukraine, and Slovakia.

Security Orchestration, Automation, and Response

Security Orchestration, Automation, and Response is referred to as SOAR. It is a kind of technology that helps organizations enhance their security operations by automating and orchestrating a variety of processes and workflows.

Insider Threat Detection and Monitoring

Insider Threat Detection and Monitoring is a crucial aspect of an organization’s cybersecurity strategy, as it focuses on identifying and mitigating risks posed by internal actors, such as employees, contractors, or partners.

Security Information and Event Management

Security Information and Event Management is known as SIEM. It is a kind of software that offers a centralized and complete picture of an organization’s security situation to improve detection, prevention, and response to security threats.

MITRE ATT&CK and Cyber Kill Chain

MITRE ATT&CK The MITRE Corporation created the MITRE ATT&CK methodology for interpreting and describing cyberattacks. It gives a thorough and well-organized taxonomy of the numerous tactics and methods that attackers use to penetrate and control computer systems.

Threat intelligence with SOC

Gathering and evaluating information about present and potential threats to an organization in order to reduce the risk of such threats is known as threat intelligence.

GLOBSEC & IstroSec

Our company, IstroSec, is about to complete its second year of operation in the market and is constantly striving to conduct its business honestly, apolitically, directly, and fairly.

OneNote Mitigation and Detection Cheatsheet

OneNote, a popular note taking app, is a part of the Office 365 suite. This means it’s very prevalent on business computers, registered to open notebooks and ready to be abused.