Cybersecurity - DEEP
Cybersecurity
How do correlation strategies work within an SOC?
Phishing, ransomware… cyber-attacks against businesses have surged this year. To protect against them, more and more businesses are choosing to set up an SOC: Security Operations Centre.
Read this articleAuthor
Alan OlszewskiPublished on
20 October 2020
The human factor is a key to cybersecurity strategy
Companies need to protect their information, whether physical or digital. Moreover, threats do not come from outside the company alone. Internal threats are all too real, and all too often overlooked.
Read this articleAuthor
PitPublished on
15 July 2020
Make the SOC more efficient with the help of an orchestrator
With any cyber threat, a rapid response is essential. The use of an orchestrator at the SOC, based on the automation possibilities offered, makes it easier to monitor alerts and take quicker decisions when facing a cyber risk.
Read this articleAuthor
Thomas ProfetaPublished on
01 January 1970
Contact us
Do you have any questions about an article? Do you need help solving your IT issues?
Contact an expertOur experts answer your questions
Do you have any questions about an article? Do you need help solving your IT issues?