5 tips for building an effective security operations center (SOC)

A security operations center (SOC) can significantly improve an organization’s security posture, but it’s not a perfect solution and can be challenging to implement. Read on to learn how to clear hurdles and build an effective SOC team.

Read more

Fileless malware: getting the lowdown on this insidious threat

In this series of articles, we provide an in-depth discussion of fileless malware and their related attacks. In part one, we cover a brief overview of the problems with and general features of fileless malware, laying the groundwork for technical analysis of various samples employing fileless and semi-fileless methods.

Read more

Select your language