Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
Home
SOC
SOC
ISACA
ISACA Ransomware Incident Management Quick Reference Guide
Marcos Jaimovich
Why do we compare a SOC (Security Operations Center) with the cockpit of a commercial...
Joas Antonio
Security Operations Center (SOC) – Tools for Operations Development by Joas Antonio
LOGPOINT
396 Use Cases & Siem Rules Code ready for use for Mitre Attacks Events Detection...
Orange Cyberdefense
Orange Cyberdefense Security Navigator 2023 – Research-driven insights to build a safer digital society
Akamai
How to Avoid Party Chaos with the Right Application-Layer DDoS Platform whitepaper by Akamai
Akamai
Network Segmentation and Microsegmentation in Moderm Enterprise Environments by Akamai
Lawrence C. Miller
Next Generation Anti-Malware Testing for Dummies – Brought to you by Cylance
SANSInstituteSecurity
A SANS 2021 survey – Security operations center
SANS
A SANS 2021 Survey for Security Operations Centers (SOCs)
Americn Public Power A.
Public Power Cyber Incident Response Playbook by American Public Power Association
APPLIED INCIDENT RESPONSE
Windows Event Security Log Analysis
SANS DFIR
NEW TO DFIR – FIELD MANUAL – The Ultimate Guide Getting Started in Forensics &...
Joas Antonio
100 Security Operation Tools for SOCs by Joas Antonio
Apress
Jump-start Your SOC Analyst Career – A Roadmap to Cybersecurity Success by Apress
Jon Radoff
The Metaverse Value Chain – The Seven Layers of the Metaverse by Jon Radoff
ARCTIC WOLF
Definitive Guide to SOC as a Service – The Essential Elements of Advanced Threat Detection...
FUTURUM - SPLUNK
How to design your Security Operations Center (SOC) to work smarter, not harder.
NCSC
NCSC Cyber Security for Small Business “SMEs” Guide.
GFCE
Developing Cyber Security as a Profession – A report by the Global Forum on Cyber...
BONI YEAMIN
OPEN SOURCE SOC TOOLS BY BONI YEAMIN
AT&T Cybersecurity
How to Build a Security Operation Center in Budget by AT&T Cybersecurity
Chris Davis
Blue Team Cheat Sheets by Chris Davis
SIEMPLIFY
The Art of Recognizing and Surviving SOC Burnout – A complete Manual for Security Operations...
MITRE
11 STRATEGIES OF A WORLD-CLASS CYBERSECURITY OPERATIONS CENTERS HIGHLIGHTS BY MITRE
US Deparment of Energy
Cibersecurity Capability Maturity Model (C2M2) by US Department of Energy
UNG
Civil-Military Cooperation and International Collaboration in CYBER OPERATIONS by UNG.
CISCO TALOS
Cisco Talos shares insights related to recent cyber attack on Cisco
CISA
2023 Top 26 Open Source Cyber Security Tools by CISA
HCSC.IN
In Simple: SIM swapping on the rise – Simple Tips on how to avoid being...
Posts navigation
1
2
3
Latest Cyber News
Data Breach Today
Healthcare in The Cloud: Detecting and Overcoming Threats to Ensure Continuity & Compliance – Source:...
20/07/2024
Data Breach Today
Banks and Airlines Disrupted as Mass Outage Hits Windows PCs – Source: www.databreachtoday.com
19/07/2024
Data Breach Today
Securing Healthcare: Minimizing Risk in an Ever-Changing Threat Landscape – Source: www.databreachtoday.com
19/07/2024
Data Breach Today
The Cost of Underpreparedness to Your Business – Source: www.databreachtoday.com
19/07/2024
Data Breach Today
Measuring Your Data’s Risk – Source: www.databreachtoday.com
19/07/2024
Data Breach Today
Top ‘Privacy by Design’ Considerations for Medical Devices – Source: www.databreachtoday.com
19/07/2024
Data Breach Today
Court’s Web Tracker Ruling: What HIPAA Entities Should Know – Source: www.databreachtoday.com
19/07/2024
Data Breach Today
Ransomware Remains a Major Threat to Energy – Source: www.databreachtoday.com
19/07/2024
Data Breach Today
Why AI and Human Behavior Drive New Urgency for Zero Trust – Source: www.databreachtoday.com
19/07/2024