Cybersecurity

Understanding Ponemon Report: How much does SOC cost?

Understanding Ponemon Report: How much does SOC cost?

In January 2020, Ponemon released a research report entitled “The Economics of SOC: How Much Will It Take to Get Results”. Surveys have shown that SOCs are expensive and average, but significant . Based on 637 valid questionnaires [the geographical area is not mentioned in the article, the author estimates that the respondents are mainly in North […]

Understanding Ponemon Report: How much does SOC cost? Read More »

Annual note on terminal security operations

Annual note on terminal security operations

This article shares the security operations of more than 10,000 terminals in a large enterprise from 0 to 1, which improves the installation rate, normal rate, and compliance rate to the extreme. As companies attach more and more importance to the difficulty of mining server and application vulnerabilities, there is a post on the website ” Now websites

Annual note on terminal security operations Read More »

In-depth explanation of the SOAR script under the private cloud

In-depth explanation of the SOAR script under the private cloud

Many people do not know what SOAR (Security Orchestration, Automation, and Response) is used for, so today I will introduce him to the core part-the script, to let everyone know him ~ I. Introduction Before discussing how to write a SOAR script, let’s review what SOAR is. Gartner defines SOAR as Security Orchestration (Automation and

In-depth explanation of the SOAR script under the private cloud Read More »

Security Orchestration Automation and Response (SOAR) Technical Resolution

Security Orchestration Automation and Response (SOAR) Technical Resolution

The background of SOAR generation With the increasingly fierce confrontation of network security, the strategy of network security should simply hope to prevent and block has failed, and we must pay more attention to detection and response. Businesses and organizations need to build a new security system that integrates blocking, detecting, responding, and preventing the assumption

Security Orchestration Automation and Response (SOAR) Technical Resolution Read More »

Information Security Incident Response Policy and Procedures

Overview: This document offers a recommended, cyclic approach to managing both cybersecurity and information security related events in a systematic manner. The phased incident response approach outlined in this document aligns with the approach recommended by the US National Institute of Standards and Technology (NIST).

Information Security Incident Response Policy and Procedures Read More »

Several Methods to Run Mimikatz

Mimikatz is an artifact that can obtain memory from the Windows Authentication (LSASS) process, and obtain plaintext passwords and NTLM hashes. Mimikatz is commonly used in intranet penetration to obtain plaintext passwords or hash values ​​to roam the intranet. However, in actual application, we often encounter the interception of killing soft, so here I refer to the information on

Several Methods to Run Mimikatz Read More »

Kaspersky Internet Security 2020Free edition

Software size: 159.72MB Kaspersky is a security software with anti-virus software and firewall functions produced by Russia. It is also a ransomware that protects your digital life in a smarter way. The software has strong active defense technology and powerful killing. Means and quick response ability, mainly aimed at home and individual users, can completely protect users’

Kaspersky Internet Security 2020Free edition Read More »