Tanishka Marrottcloud-design-diaries.hashnode.devยทAug 7, 2024A Day in the Life of a Cloud Security Engineer : Safeguarding the Digital FrontierIntroduction As the sun rises, a Cloud Security Engineer begins another day of safeguarding the digital frontier. Meet Tanishka, whose journey into the world of cloud security began a couple of years back, Her role is not just about reacting to d...Discussยท1 likeprisma cloud
Harshal ShahforHarshal_Shah' Blogdelvingwithharshal.hashnode.devยทAug 7, 2024OWASP Top 10: A Deep Dive into Web Application SecurityThe Open Web Application Security Project (OWASP) is a non-profit foundation dedicated to improving software security. One of its most influential initiatives is the OWASP Top 10, a regularly updated report outlining the most critical security risks ...DiscussFortify and Defend: Navigating the Cybersecurity LandscapeWeb Security
Ibraheem Uthmancsr.hashnode.devยทJun 30, 2024What are SOC and SIEM? A Simple Guide to Security OperationsThe threat landscape is changing drastically and getting more sophisticated as we obviously sail into today's digital age. In this respect, companies take further and vigorous steps to ensure that maximum protection is given to information in this di...DiscussSIEM
MrBlackHaremrblackhare.comยทJun 20, 2024SOC Analyst FundamentalsWhat is a SOC? Security Operation Center (SOC) is a place where an information security team monitors and analyses the security of an organisation. Their main purpose is to detect, analyse and respond to incidents. SOC Models In-house SOC The enterpr...DiscussSOC Analystsoc fundamentals
Tuan Tran Vanblog.tuanhadev.techยทJun 6, 2024Software Engineering Principles Cheatsheet - Part IIntroduction Software design principles are the foundation of software development. As a software engineer, you can find them in your work tools, languages, frameworks, paradigms, and patterns. They are the core pillars of "good" and "readable" code....Discussยท34 readsDeveloper Best Code PracticesDesign
Cloud Tunedcloudtuned.hashnode.devยทApr 4, 2024Understanding SOC: Security Operations CenterUnderstanding SOC: Security Operations Center In today's cybersecurity landscape, organizations face a constant barrage of threats ranging from malware and phishing attacks to advanced persistent threats (APTs). To effectively detect, respond to, and...DiscussSOC
Quantum Cyber Solutionsqcs.hashnode.devยทMar 24, 2024SOC: The Digital Watchtower Guarding Against Cyber Threats ๐๐ก๏ธPublished on Sunday, March 24, 2024 SOC: The Digital Watchtower Guarding Against Cyber Threats ๐๐ก๏ธ ==================================================================== Authors Name Elon Tusk ๐ Twitter What is SOC? ๐ป A Security Operations Cent...Discusscybersecurity
Quantum Cyber Solutionsqcs.hashnode.devยทMar 24, 2024SOC: The Digital Watchtower Guarding Against Cyber Threats ๐๐ก๏ธPublished on Sunday, March 24, 2024 SOC: The Digital Watchtower Guarding Against Cyber Threats ๐๐ก๏ธ ==================================================================== Authors Name Elon Tusk ๐ Twitter What is SOC? ๐ป A Security Operations Cent...Discusscybersecurity
CyRAACScyraacs.hashnode.devยทJan 31, 2024The Ultimate Guide to Understanding SOC as a Service (SOCaaS)In today's hyper-connected world, cybersecurity threats are more sophisticated and relentless than ever. Traditional security solutions simply can't keep up, leaving businesses vulnerable to costly data breaches and operational disruptions. That's wh...DiscussSOCaaS provider
Awais Sajidblackdiamond.hashnode.devยทJan 12, 2024Exploring InsightIDR by Rapid7: A Modern SIEM Solution โ Part 4: InsightIDR DeploymentStep 1: Installing the InsightIDR Collector Before we get into the details, make sure you have access to the InsightIDR console. Follow these simple steps to install the Collector: Navigate to Data Collection Management: Head over to the console and...Discussseim