Najnowsze publikacje

Security Orchestration, Automation, and Response

Security Orchestration, Automation, and Response is referred to as SOAR. It is a kind of technology that helps organizations enhance their security operations by automating and orchestrating a variety of processes and workflows.

Insider Threat Detection and Monitoring

Insider Threat Detection and Monitoring is a crucial aspect of an organization’s cybersecurity strategy, as it focuses on identifying and mitigating risks posed by internal actors, such as employees, contractors, or partners.

Security Information and Event Management

Security Information and Event Management is known as SIEM. It is a kind of software that offers a centralized and complete picture of an organization’s security situation to improve detection, prevention, and response to security threats.

MITRE ATT&CK and Cyber Kill Chain

MITRE ATT&CK The MITRE Corporation created the MITRE ATT&CK methodology for interpreting and describing cyberattacks. It gives a thorough and well-organized taxonomy of the numerous tactics and methods that attackers use to penetrate and control computer systems.

Threat intelligence with SOC

Gathering and evaluating information about present and potential threats to an organization in order to reduce the risk of such threats is known as threat intelligence.

GLOBSEC & IstroSec

Our company, IstroSec, is about to complete its second year of operation in the market and is constantly striving to conduct its business honestly, apolitically, directly, and fairly.

OneNote Mitigation and Detection Cheatsheet

OneNote, a popular note taking app, is a part of the Office 365 suite. This means it’s very prevalent on business computers, registered to open notebooks and ready to be abused.

SOC and Incident Response

The process of investigating, minimizing, and mitigating the impacts of a security problem is known as incident response.

SOC overview

What is SOC? Security Operations Center is referred to as SOC. Cybersecurity experts monitor and evaluate a company’s networks and systems for security risks in a physical or virtual SOC, where they also react to security issues as they happen.