Favorite SOC Analyst Interview Questions
Hiring a SOC analyst? Asking the right questions is key to identifying the best employee as well as helping determine what skills can best complement your organization.
Hiring a SOC analyst? Asking the right questions is key to identifying the best employee as well as helping determine what skills can best complement your organization.
In part two of our Q&A with Ben McGraw, we discuss how automation will change the industry, how to improve the cybersecurity skills gap, and who is Digital Guardian's best basketball player.
In part one of our Q&A with Ben McGraw, we discuss his journey to Digital Guardian, insights from DG's Analytics & Reporting Cloud, and what makes a good threat hunter.
In this post, the first of two blogs, Tim Bandos helps break down the DFIR tools and processes he uses to carry out investigations.
Learn about the MITRE ATT&CK Framework, how it can be used to classify adversary behaviors, and assess an organization's risk in this week's Data Protection 101.
In the third and final part of a three part series, Tim Bandos, Digital Guardian's VP of Cybersecurity, describes how to best leverage MITRE's Attack Framework for threat hunting.
In part two of a three part series, Tim Bandos, Digital Guardian's VP of Cybersecurity, describes how to best leverage MITRE's Attack Framework for threat hunting.
Tim Bandos, Digital Guardian's VP of Cybersecurity, describes how to best leverage MITRE's Attack Framework for threat hunting.
Tim Bandos, senior director of cybersecurity at Digital Guardian, describes how to leverage Shimcache, to conduct enterprise scale threat hunting.
Our Guide to Threat Hunting series concludes with tips for using managed security services to bolster your threat hunting program.