Your security operations center is under attack. How do you identify the source of the threat?
If you work in a security operations center (SOC), you know how important it is to protect your network from cyberattacks. But what if your SOC itself is under attack? How can you identify the source of the threat and respond effectively? In this article, we will discuss some network engineering tools and techniques that can help you detect and mitigate an attack on your SOC.
-
Cristian CritelliEMEA Lead Networking & Resilience Specialist Partner Solution Architect at Amazon Web Services (AWS) [ex Microsoft…
-
Desmond DurrantPMP | CISSP | CCSE | CISO | CCIE | MCSA | MCSE AZ 300 | CKA | AZ 500 | AZ 301 | AZ 900 | AZ104
-
Abdul HayeeCyber Security Management (CISSP | CISM | CSP | ISO 27001 LA | CHFI | Sec+ | CEH | ITIL | JNCP | CCNP)