While each SOC may have its own unique structure and technology stack, there remains a core set of tools and methodologies that analysts should be familiar with to effectively handle a variety of investigations and evidence sources in the field. Rather than focusing...
Honeypots: Detection, Recon, and Misdirection A honeypot in cyber security is basically a trap that lures in attackers and can slow down the pace of an attack, gather actionable intelligence, and even alert an organization that an attack is occurring. In this blog,...
Introduction Are you preparing for the new Practical SOC Analyst Associate (PSAA) certification exam? As the creator of the certification and included SOC 101 training materials, I collected a few high-level tips to help you feel confident and prepared going into the...
In our roles as cybersecurity professionals, we often find ourselves drowning in a sea of data logs, unable to extract meaning and insight from the enormous amount of data. This is where the great trio of sed, awk, and grep can be put into action. In spite of the fact...
Introduction In recent years, the demand for skilled security professionals has grown as more organizations recognize the importance of investing in cybersecurity operations. However, this increased demand, paired with a growing interest in breaking into...
Introduction With the evolving sophistication and persistence of threat actors, there is no excuse for organizations to be unprepared to strategically and quickly respond to the inevitable—cybersecurity incidents. Among its many documented standards, the National...