Data Privacy Day (known in Europe as Data Protection Day) is an international event aimed at raising awareness about data privacy and protection practices among businesses as well as internet users. In this blog series, we’ll attempt to do the …
Saudi Aramco data breach: A reminder to start monitoring RPIs
On June 23, 2021, threat actors reported that they had stolen a terabyte of data from Saudi Aramco, a state-owned oil company in Saudi Arabia.
The threat actors released samples of data they had procured after redacting critical information. They …

Watch out for tenants living off your land
The cyberworld has witnessed and defended against several forms of attacks. Some of the most common ones known to disrupt a network include credential stealing, malware installations, worms and viruses, and insider threats. In order to execute these attacks successfully, …

Security operations center, Part 2: Life of a SOC analyst
In the first part of this blog series, we saw a brief overview of what a security operations center (SOC) is and how it operates. In this part, we’ll take a look at the typical activities that SOC analysts carry …
Are you listening to your logs? Part 3: High disk usage
In the previous blog of this series, we saw how server crashes can be avoided by detecting low disk space in time using logs. In this blog, we’ll talk about another server metric, disk usage, and how it can be …
Are you listening to your logs? Part 2: Low disk space
In the first part of this blog series, we saw how monitoring slow server response times in your network can help detect denial-of-service (DoS) attacks. In this blog, we look at how logs can detect an operational issue such as …
Are you listening to your logs? Part 1: Slow server response
Loading…
Is there a more uninspiring word to encounter while browsing the internet? When a loading screen occurs, statistics show it takes only three seconds for a potential customer to leave your website.
Are you listening to your logs? is …

Security operations center, Part 1: The guardian of your organization
Hacking is finding a way to accomplish a goal, never accepting no for an answer, and being more persistent and patient than anyone else. – Paul Asadoorian, founder and CTO, Security Weekly.
Hackers arm themselves with the latest technologies, employ …