Archives
- 25 Feb Collaborative Threat Defense: Tools Working Together in a SOC
- 24 Feb Threat Intelligence for SOC
- 23 Feb SOC : Essential Tools for Threat Detection
- 22 Feb Dealing with DDoS Attacks
- 21 Feb Zero Trust Security Architecture
- 20 Feb Threat Hunting: A Comprehensive Analysis of Proactive Cyber Defence
- 19 Feb Understanding EDR: A Deep Dive
- 18 Feb Exploring Sysmon
- 17 Feb Streamlining Incident Response and Threat Detection
- 16 Feb Incident Response: A Deep Dive
- 15 Feb Understanding SIEM
- 14 Feb Understanding IDS/IPS: A Dive into Threat Monitoring
- 13 Feb Vulnerability Assessment: A Deep Dive
- 12 Feb Metasploit for SOC Analysts
- 11 Feb Significance of Bash Scripting
- 10 Feb IAM in Cloud Security
- 09 Feb The CIA Triad
- 23 Nov Initiation