Security researchers have been trying to understand func-tioning of a security operation center (SOC) and how se-curity analysts perform their job. This effort is motivated by the fact that security monitoring and analysis is not just a technical problem. Researchers must take into considera-tion the human and organizational factors for their research ideas to succeed. Much work towards this direction has been through interviews of security analysts in SOCs. Interviews, however useful, will not be always possible as analysts work in a high-stress and time constrained environment. Thus the understanding of operational challenges through interviews is quite shallow. There is also an issue of trust that limits the amount of information an anal...
System administrators (sysadmins) are the linchpin of civilization, managing the Information Technol...
This study develops categories of responses to security incidents, based on a grounded theory analys...
Malware has evolved from viruses attacking single victims to more sophisticated malware with disrupt...
Security Operation Centers (SOCs) have become an integral component of business organizations all ov...
The increasing use of Security Operations Centers (SOCs) by organisations as a part of their cyberse...
Since Security Operations Centers (SOCs) were first implemented, they have strived to protect the or...
Offensive security-tests are commonly employed to pro-actively discover potential vulnerabilities. T...
The anthropology of security is slowly developing into a substantial sub-discipline of anthropology,...
Cybersecurity is a pressing issue. Researchers have proposed numerous security solutions over the ye...
International audienceSecurity Operations Centers (SOCs) collect data related to the information sys...
In this project we want to expose what is a Security Operations Center (SOC) and why companies need...
This chapter relates to human factors in computer security, and how surface technology might support...
We report preliminary results of our ongoing field study of IT professionals who are involved in sec...
The security administration of large organizations is exceptionally challenging due to the increasin...
This thesis investigates four different aspects of information security management: challenges faced...
System administrators (sysadmins) are the linchpin of civilization, managing the Information Technol...
This study develops categories of responses to security incidents, based on a grounded theory analys...
Malware has evolved from viruses attacking single victims to more sophisticated malware with disrupt...
Security Operation Centers (SOCs) have become an integral component of business organizations all ov...
The increasing use of Security Operations Centers (SOCs) by organisations as a part of their cyberse...
Since Security Operations Centers (SOCs) were first implemented, they have strived to protect the or...
Offensive security-tests are commonly employed to pro-actively discover potential vulnerabilities. T...
The anthropology of security is slowly developing into a substantial sub-discipline of anthropology,...
Cybersecurity is a pressing issue. Researchers have proposed numerous security solutions over the ye...
International audienceSecurity Operations Centers (SOCs) collect data related to the information sys...
In this project we want to expose what is a Security Operations Center (SOC) and why companies need...
This chapter relates to human factors in computer security, and how surface technology might support...
We report preliminary results of our ongoing field study of IT professionals who are involved in sec...
The security administration of large organizations is exceptionally challenging due to the increasin...
This thesis investigates four different aspects of information security management: challenges faced...
System administrators (sysadmins) are the linchpin of civilization, managing the Information Technol...
This study develops categories of responses to security incidents, based on a grounded theory analys...
Malware has evolved from viruses attacking single victims to more sophisticated malware with disrupt...