Experience the ultimate flexibility with the Isolation API, allowing you to securely Quisque pellentesque id ultrices lacus ornare elit vitae ullamcorper. Learn More

SOC

Latest blogs

Topic : SOC
  • --Any--
  • Anonymous research
  • Compliance
  • Cryptocurrency
  • Cybersecurity
  • Dark web basics
  • Dark web research
  • Digital fingerprint
  • Financial crime
  • Fraud and brand misuse
  • Law enforcement
  • OSINT news
  • OSINT research
  • Phishing/malware
  • Product info
  • Secure web access
  • SOC
  • Social media
  • Threat intelligence
  • Trust and safety
  • VPN
  • Zero-trust app access

A recent Google malvertising scheme highlights the need for secure research environment

Investigating a malvertising scheme that tricked one of the world’s largest search engines is a dangerous game. Here’s how to do so safely:

Automating collection for SOC investigations

Not just the realm of TIPs. Automated collection of deeper-dive online research related to SOC investigations is an important tool in an…

Give CTI its own seat at the table

Considering where cyberthreat intelligence teams should reside in the organizational structure can make a major difference in the…

Safely investigate phishing sites without getting hooked

Phishing sites commonly contain malicious content that can put SOCs and their organizations at risk as they conduct investigations. But…

Mitigating risk in SOC investigations with managed attribution

Cloud-based web isolation neutralizes cyberthreats in employees’ everyday web activity — but how do SOCs secure their own online…

generia blog

New Splunk integration for threat hunting, other online research

New Silo for Research feature provides Splunk integration for threat hunting and other online research, so enterprises maintain an…

generia blog

Incident response to APTs: stop data loss, maintain connectivity, find the adversary

When performing incident response to APTs, balance priorities of fully rooting out adversaries and limiting disruption to the business.

Gaining efficiency in the overloaded SOC

Email-based and web-based attacks have unnecessarily overloaded SOCs with incidents to investigate and taken attention away from truly…

generia blog

Handbook: Tools, tips and tricks for threat hunters

A new manual published by Authentic8 helps threat hunters fill critical gaps and hone their tradecraft.

Blog updates

Stay updated with the latest posts from the blog
Close
Close