Trending SoC Discussions

Follow

Ask the Community


Ask any professional question and get answers from other specialists.

Stream language
Hemza ATOUB's image
Question added by Hemza ATOUB Sr. CYBER SECUIRITY Consultant IT/OT Certified IBM QRadar| Arcsight SIEM | ISO 27k1 | ICS | 20 CSC CONFIDENTIAL
7 years ago

What's the difference between Cybersecurity Policy & Information Security Policy?‎

cyber security, information security, cyberspace, SOC, ‎

Answers:
13
Followers:
Views:
46
Vote Count:
0
Answer should contain a minimum of 25 characters.
Hemza ATOUB's image
Question added by Hemza ATOUB Sr. CYBER SECUIRITY Consultant IT/OT Certified IBM QRadar| Arcsight SIEM | ISO 27k1 | ICS | 20 CSC CONFIDENTIAL
7 years ago

Data-Diodes security Best Practices?‎

What are the Best Practices of Data-Diodes security Architectures deployement: in Protecting Industrial Systems, Data Storage, Security Operations Centers SOC, ...‎

Answers:
7
Followers:
Views:
74
Vote Count:
0
Answer should contain a minimum of 25 characters.
Gourab Mitra's image
Question added by Gourab Mitra Manager IT Project Program and Delivery Management(Full Time Contract/Consulting Role) IXTEL(ixtel.com)
10 years ago
Answers:
9
Followers:
Views:
381
Vote Count:
2
Answer should contain a minimum of 25 characters.
David Giorgobiani's image
Question added by David Giorgobiani Security Operations Solutions Architect M.F.GE
5 years ago
Answers:
1
Followers:
Views:
2
Vote Count:
0
Answer should contain a minimum of 25 characters.
saravanan radhakrishnan's image  
Answer added by  saravanan radhakrishnan, Sales Manager - Managed Security Services, Tata Communications FZ LLC
5 years ago

SOC - SECURITY OPERATIONS CENTER   ITS A COMMAND AND CONTROL CENTER EQUIPPED WITH SKILLED IT SECURITY ENGINEERS WITH VARIOUS SECURITY PRODUCTS AND SERVICES SKILLSET MONIT ... See More

Default profile image  
Answer added by  Deleted user
6 years ago

Cybersecurity: The ability to protect or defend the use of cyberspace from cyber attacks. Information Security: The protection of information and information systems from ... See More

abdul nadeem shaikh's image  
Answer added by  abdul nadeem shaikh, project engineer /project manager electrical, different companies in different times
2 years ago

Security Operation Centers

mohammed alaa borji's image  
Answer added by  mohammed alaa borji, CISO, Confidentiel
9 years ago

in Soc you must have many level: 1- classic : firewall , Ips, Ids ... 2- SIEM 3- some tools to monitor network devices,server  and services 4- LDAP ... 

Pushpendra Chavan's image  
Answer added by  Pushpendra Chavan, Technical Support Engineer, Red Hat Software Services (India) Pvt. Ltd., Pune
10 years ago

If you ask me, I would suggest to watch out the following things so closely on routine basis.   1. Changes in the filesystem : This will let you know that nothing unusual ... See More

yashar khodaghadir's image  
Answer added by  yashar khodaghadir
3 years ago

Cybersecurity is dealing with Information systems and any IT-related system. But Information security is about information not only in the form of IT systems. Every aspec ... See More