0xffccddSOC Cybersecurity ToolsSecurity Operations Centers (SOCs) are essential for any organization that wants to protect itself from cyberattacks. A SOC is a team of…2 min read·May 29, 2024----
0xffccddCloud Detection and Response VendorsIn today’s digital landscape, cloud security is paramount. Businesses are increasingly migrating their operations and data to the cloud…2 min read·May 27, 2024----
0xffccddCloud Detection and Response ToolsThe cloud offers incredible scalability and agility for businesses, but it also introduces a new security landscape. Traditional security…2 min read·May 26, 2024----
0xffccddHow to search logs in S3/Azure/GCP in 2023 using cloudgrepIntroduction2 min read·Oct 22, 2023----
0xffccddMemory Forensics CheatsheetMemory forensics is the analysis of volatile data stored in a computer’s memory. It can help investigators identify malicious activities…2 min read·May 27, 2023----
0xffccddSOC2 Compliance ChecklistSOC 2 is a voluntary compliance standard developed by the American Institute of CPAs (AICPA) that specifies how organizations should manage…2 min read·May 8, 2023----
0xffccddCloud Forensics ToolsCloud forensics is the process of analyzing and collecting evidence from cloud-based systems and infrastructure for the purpose of a legal…6 min read·Dec 20, 2022----
0xffccddAutomated Incident Response ToolsAutomated incident response is a super exciting topic in the world of cyber right now. As cyber attacks become more sophisticated and…2 min read·Dec 17, 2022----
0xffccddCloud Forensic Readiness: Preparing for incidents in AWS, Azure and GCPWhen it comes to cloud forensic readiness organizations of all sizes must be prepared to respond to any security incident that may arise in…5 min read·Dec 16, 2022----
0xffccddMemory Forensics ToolsMemory forensics is the art of analyzing a computer’s memory dump for the purpose of investigating an incident or collecting evidence. This…2 min read·Dec 15, 2022----