5 tips for building an effective security operations center (SOC)

Credit to Author: Gilad Maayan| Date: Fri, 13 Dec 2019 16:00:00 +0000

A security operations center (SOC) can significantly improve an organization’s security posture, but it’s not a perfect solution and can be challenging to implement. Read on to learn how to clear hurdles and build an effective SOC team.

Categories:

Tags:

(Read more…)

The post 5 tips for building an effective security operations center (SOC) appeared first on Malwarebytes Labs.

Read more

Fileless malware: getting the lowdown on this insidious threat

Credit to Author: Vasilios Hioureas| Date: Wed, 29 Aug 2018 16:48:35 +0000

In this series of articles, we provide an in-depth discussion of fileless malware and their related attacks. In part one, we cover a brief overview of the problems with and general features of fileless malware, laying the groundwork for technical analysis of various samples employing fileless and semi-fileless methods.

Categories:

Tags:

(Read more…)

The post Fileless malware: getting the lowdown on this insidious threat appeared first on Malwarebytes Labs.

Read more