SOC

Latest blogs

Topic : SOC
  • --Any--
  • Anonymous research
  • Compliance
  • Cryptocurrency
  • Cybersecurity
  • Dark web series
  • Digital fingerprint
  • Financial crime
  • Fraud and brand misuse
  • Law enforcement
  • OSINT news
  • Phishing/malware
  • Product info
  • Secure web access
  • SOC
  • Social media
  • Threat intelligence
  • Trust and safety
  • VPN
  • Zero-trust app access

Dentists aren't heart surgeons: pitfalls of building an intel team

If you don't want your dentist operating on your leg, NeedleStack guest A.J. Nash asks, why are you putting incident response in charge of…

A recent Google malvertising scheme highlights the need for secure research environment

Investigating a malvertising scheme that tricked one of the world’s largest search engines is a dangerous game. Here’s how to do so safely:

Automating collection for SOC investigations

Not just the realm of TIPs. Automated collection of deeper-dive online research related to SOC investigations is an important tool in an…

SOC analysts: 3 non-negotiable needs for online investigation

An unprecedented level of cyber attacks and phishing attempts makes the security needs of SOC teams greater than ever

Give CTI its own seat at the table

Considering where cyberthreat intelligence teams should reside in the organizational structure can make a major difference in the…

Safely investigate phishing sites without getting hooked

Phishing sites commonly contain malicious content that can put SOCs and their organizations at risk as they conduct investigations. But…

Mitigating risk in SOC investigations with managed attribution

Cloud-based web isolation neutralizes cyberthreats in employees’ everyday web activity — but how do SOCs secure their own online…

generia blog

New Splunk integration for threat hunting, other online research

New Silo for Research feature provides Splunk integration for threat hunting and other online research, so enterprises maintain an…

generia blog

Incident response to APTs: stop data loss, maintain connectivity, find the adversary

When performing incident response to APTs, balance priorities of fully rooting out adversaries and limiting disruption to the business.

Blog updates

Stay updated with the latest posts from the blog
Close
Close