Cyber Threat Hunt Cycle
Project Name: Cyber Threat Hunt cycle Description: – Whenever adversary is changing the routine procedure and evade defenses of enterprises Cyber… read out Cyber Threat Hunt Cycle
Discover yourself in New year
Discover yourself in New year Author: Amruta Sadgune / Rohit D Sadgune New year is impending and we have… read out Discover yourself in New year
Indicator of Attack vs Indicator of Compromises
Indicator of Attack vs Indicator of Compromises Project Name: Indicator of Attack vs Indicator of Compromises (IOA vs IOC) Description: – … read out Indicator of Attack vs Indicator of Compromises
How to keep your cell phones secure
How to keep your cell phones secure Project Name: How to keep your cell phones secure Description: Mobile malware is spreading… read out How to keep your cell phones secure
Power of Security Operation Center
Power of Security Operation Center Project Name: Power of Security Operation Center Description: – Power of Security Operation Center is a… read out Power of Security Operation Center