Security Information Event Mangement (SIEM)

security information event management

Introduction Security information and event management (SIEM) technology supports threat detection, compliance and security incident management through the collection and analysis (both near real time and historical) of security events, as well as a wide variety of other event and contextual data sources. The core capabilities are a broad scope of log event collection and […]

What is Security Operations Center (SOC)?

Security Operations Center (SOC)_

Introduction A security operations center (SOC) is a facility that houses an information security team responsible for monitoring and analyzing an organization’s security posture on an ongoing basis. The SOC team’s goal is to detect, analyze, and respond to cybersecurity incidents using a combination of technology solutions and a strong set of processes. Security operations […]

Cyber Threat Intelligence v2.0

cyber threat intelligence

Introduction Cyber threat intelligence refers to a dynamic, adaptive technology that leverages large-scale threat history data to proactively block and remediate future malicious attacks on a network. Cyber threat intelligence itself is not a solution, but it is a crucial security architecture component. Because of evolving threats, security solutions are only as effective as the […]

Incident Management

Incident Management

What is Incident Management? Security incident management is the process of identifying, managing, recording and analyzing security threats or incidents in real-time. It seeks to give a robust and comprehensive view of any security issues within an IT infrastructure. A security incident can be anything from an active threat to an attempted intrusion to a […]

Cybersecurity vs. Information Security vs. Network Security

Introduction- We know  that security is a must in the Digital world . News reports about  cyberattacks and data breaches leave no doubt that strong security is a must. But what’s the difference between information security, cybersecurity and network security? When humans begin to keep secrets, that’s when information security came. In earlier days we […]