Good news ! Hackbusters community is waiting for you !
KnowBe4 has been running the HackBusters site for a few years now, providing you with trending IT security news. We are expanding it and have launched a new exciting online community! The forum is divided into four main topics or categories: Social Engineering, Ransomware, Phishing and Security Awareness Training. You are invited to be one of the first to join us at:

5 Steps for Implementing an Effective Cyber SOC


Advanced SOC Operations / CSOC , Next-Generation Technologies, Secure Development

Cyber SOCs, the next generation of security operations centers, need to use a new approach to detecting emerging attacks, says Aadesh Gawde, principal consultant at the Dubai-based IT risk consultancy ProVise Consulting, who offers implementation tips.

"Five years ago, a SOC was primarily a rule-based technology. But now it's impossible to write a rule and predict an attack," Gawde says in an interview with Information Security Media Group. "So the known attack surfaces have actually shrunk and there is a vacuum created for unknown attack surfaces."

CISOs need to take five key steps when implementing a cyber SOC, Gawde says. Those include:

Assess the overall security maturity of the organization and the level desired; Size up the threat landscape; Select the appropriate technology; Choose an operating model; Create performance metrics.

In this interview (see audio link below image),...(continued)

View All Trending Stories