Security Operation Centers (SOCs) have become an integral component of business organizations all over the world. The concept of a SOC has existed for a few years now yet there is no systematic study documenting the occurrences of their operations. A lack of documented operational knowledge makes it a challenge for security researchers interested in improving operational efficiency through algorithms, tools, and processes. SOC environments operate under a secrecy culture as a result of which researchers are not trusted by analysts and their managers. This lack of trust leads to only superficial information through methods such as interviews. Moreover, security analysts perform their tasks using hunches that are difficult to articulate a...
AbstractCyber security is a pervasive issue that impacts public and private organizations. While sev...
The security administration of large organizations is exceptionally challenging due to the increasin...
Information Technology transformed the way people executed their tasks at work. With the information...
Security Operation Centers (SOCs) have become an integral component of business organizations all ov...
Security researchers have been trying to understand func-tioning of a security operation center (SOC...
Offensive security-tests are commonly employed to pro-actively discover potential vulnerabilities. T...
Cybersecurity is a pressing issue. Researchers have proposed numerous security solutions over the ye...
Organizations Advanced persistent threats (APTs) are the most complex cyberattacks and are generally...
Social engineering is a very old method to influence people in their daily actions. The same methods...
Over recent decades, we have moved our workflows, record management, and communications into digital...
Current tools and solutions to handle incident response and forensics focus only on one piece of evi...
Published ArticleThere is an ongoing debate on the importance and meaning of organisational culture....
Malware has evolved from viruses attacking single victims to more sophisticated malware with disrupt...
Cybersecurity have drawn special attention of organizations in the 21st century because of the preva...
Research on information security culture evolved because technical security controls and policies ha...
AbstractCyber security is a pervasive issue that impacts public and private organizations. While sev...
The security administration of large organizations is exceptionally challenging due to the increasin...
Information Technology transformed the way people executed their tasks at work. With the information...
Security Operation Centers (SOCs) have become an integral component of business organizations all ov...
Security researchers have been trying to understand func-tioning of a security operation center (SOC...
Offensive security-tests are commonly employed to pro-actively discover potential vulnerabilities. T...
Cybersecurity is a pressing issue. Researchers have proposed numerous security solutions over the ye...
Organizations Advanced persistent threats (APTs) are the most complex cyberattacks and are generally...
Social engineering is a very old method to influence people in their daily actions. The same methods...
Over recent decades, we have moved our workflows, record management, and communications into digital...
Current tools and solutions to handle incident response and forensics focus only on one piece of evi...
Published ArticleThere is an ongoing debate on the importance and meaning of organisational culture....
Malware has evolved from viruses attacking single victims to more sophisticated malware with disrupt...
Cybersecurity have drawn special attention of organizations in the 21st century because of the preva...
Research on information security culture evolved because technical security controls and policies ha...
AbstractCyber security is a pervasive issue that impacts public and private organizations. While sev...
The security administration of large organizations is exceptionally challenging due to the increasin...
Information Technology transformed the way people executed their tasks at work. With the information...