Today’s Cyber security operations center (CSOC) should have everything it needs to mount a competent defense of the ever-changing information technology (IT) enterprise. This includesRead more
What is an Indicator of Attack (IOA) IoA’s is some events that could reveal an active attack before indicators of compromise become visible. Use ofRead more
The purpose of this article is to provide you with a depth understanding of the Windows Registry and Wealth of information it holds. Today mostRead more
As cyberattacks become more sophisticated than ever, establishing a security operations center (SOC) has become essential. The SOC is a central IT center from whereRead more
Logs are fetched to the SIEM in two different ways. Agent-based & Non-Agent based. In the agent-based approach, a log pushing agent is installed inRead more
ADS goes here!If you don't see it, then please turn OFF
AD blocker for this website.
Our ads are not aggressive and help us
pay for the server and coffee.
THANK YOU for your support!