After the first article which covered "Extending the scope of detection to new perimeters” (see here), and the second, dedicated to “Enhancing detection through new approaches” (available here)... this is the conclusion to this (epic!) saga. This last installment will…
Author: Amaury Coulomban
After the first article, which covered "Extending the scope of detection to new perimeters" (available here), this second installment is the next in our summer series about the SOC... Enhancing detection with new approaches Think identity to detect suspect…
SOC teams are finding it more and more difficult to detect increasingly complex attacks that take place over ever larger perimeters. At the same time, they are bearing the full brunt of the explosion in the number of alerts to…
Les menaces cyber sont de plus en plus sophistiquées et les attaquants de plus en plus créatifs pour contourner les dispositifs de sécurité des défenseurs. Les mesures classiques de prévention quant à elles s’efforcent en permanence de s’adapter aux nouveaux…