SOC for intermediate. We are sorting out what we are protecting, or how to make an inventory of the

SOC for intermediate. We are sorting out what we are protecting, or how to make an inventory of theinfrastructure.And again, hello. The cycle "SOC for " continues its movement and development. We have already covered the first layer of the internal kitchen of the monitoring and incident response centers in previous articles, so let's try to go a little deeper into technical details and more subtle problems.  We have already several times indirectly touched on the topic of asset management: and in article about the security control , and in issues of automation and artificial intelligence in SOC . Obviously, without monitoring the infrastructure of the customer, the monitoring center will not ...
+ 0 -

The miners replaced the cryptographers

We at Solar JSOC permanently collect impersonal data on events and incidents of information security in customer infrastructures. On the basis of this information, we do an analysis every six months, which demonstrates how attacks on Russian organizations are changing. Today we have collected for you the most interesting trends of the second half of 2017
 
 
The miners replaced the cryptographers  
they told , how to properly build the process of using external sources of threat information. Here are the types of Threat Intelligence we use:
 
 
 
Opensource - open databases of malware indicators, management servers and phishing links. As ...
+ 0 -

What is SaaS-business

+ 0 -