Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
SOC -CSIRT – Incidents & Attacks Notepad
Vendors & – MSSP Ecosystem
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
Home
SOC
Page 3
SOC
CISO2CISO.COM
SOC Analyst Interview Questions
Splunk
Five Automation Use Cases for Splunk SOAR by Splunk – Alert Enrichment , Phishing Investigation...
Aristeidis Michail
Security Operations Center – A Business Perspective by Aristeidis Michail
Logan Simpson
4 Steps to Building a Master Blue Team Home Lab by Logan Simpson
CSO Online
7 Best Reasons to be a CISO by Michaell Hill UK Editor CSO
MITRE
11 STRATEGIES OF A WORLD-CLASS CYBERSECURITY OPERATIONS CENTERS HIGHLIGHTS BY MITRE
FUTURUM - SPLUNK
How to design your Security Operations Center (SOC) to work smarter, not harder.
Joas Antonio
100 Security Operation Tools for SOCs by Joas Antonio
Microsoft & CyberProof
A Complete Guide to Modernizing your Security Operations Centers (SOCs) by Microsoft and CyberProof
HCSC.IN
In Simple: SIM swapping on the rise – Simple Tips on how to avoid being...
Apress
Jump-start Your SOC Analyst Career – A Roadmap to Cybersecurity Success by Apress
CardinalOps
The State of SIEM Detection Risk 2022 Report – Quantifying the gaps in MITRE ATT&CK...
CISA
2023 Top 26 Open Source Cyber Security Tools by CISA
MALTEGO
HANDBOOK FOR SOCIAL MEDIA INVESTIGATIONS by MALTEGO
CHECKPOINT RESEARCH
Checkpoint Cyber Attack Trend 2022 Mid Year Report by Check Point Research
SANS
A SANS 2021 Survey for Security Operations Centers (SOCs)
cybereason
Ransomware and the Modern SOC – How Ransomware is Driving the Requirements for SOC Modernization...
PICUS
The Complete Active Directory Security Handbook – Exploitation – Detection and Migitation Strategies by PICUS
ChatGPT & Haci Dasgin
Malware Analisys 101 – created by ChatGPT in 20 minutes
Herve Debar
Security Operations & Incident Management Knowledge Area by Herve Debar – Telecom SudParis
Lester Chng
How to Define Objetives for Cybersecurity Tabletop Exercises by Lester Chng
not known
Threat Intelligence & Dark web Monitoring Tools
Rahmat Nurfauzi "@infosecn1nja"
Red Team Security Open Source Toolkit
Purple Knight
2022 Purple Knight Report – Facing the Unknown – Uncoverging & Addressing Systemic Active Directory...
Apress
Wireshark for Network Forensics – An Essential Guide for IT and Cloud Professionals by Nagendra...
Cyber Chief Magazine
Prevent Mallware with System Hardering – Strengthen Security by Cyber Chief Magazine
IGNITE Technologies
Incident Response Cheatsheet Windows & Linux by Hackingarticles.in – Ignite Technologies
Posts navigation
1
2
3
Latest Cyber News
The Register Security
AT&T, Verizon, Sprint, T-Mobile US fined $200M for selling off people’s location info – Source:...
30/04/2024
The Register Security
Google blocked 2.3M apps from Play Store last year for breaking the G law –...
30/04/2024
The Register Security
London Drugs closes all of its pharmacies following ‘cybersecurity incident’ – Source: go.theregister.com
30/04/2024
The Register Security
France willing to buy key Atos assets to keep them French – Source: go.theregister.com
30/04/2024
The Register Security
UK lays down fresh legislation banning crummy default device passwords – Source: go.theregister.com
30/04/2024
The Register Security
Watchdog reveals lingering Google Privacy Sandbox worries – Source: go.theregister.com
30/04/2024
The Register Security
The next step up for high-impact identity authorization – Source: go.theregister.com
30/04/2024
The Register Security
Discord dismantles Spy.pet site that snooped on millions of users – Source: go.theregister.com
30/04/2024
The Register Security
Kaiser Permanente handed over 13.4M people’s data to Microsoft, Google, others – Source: go.theregister.com
30/04/2024