06/09/2022
Szabó Gábor –
Before we dive deep into malware reverse engineering (MRE), it’s worth talking a little about the steps that precede it. There are a multitude of technologies that were designed to help detect malicious codes, such as antivirus tools, EDR systems, and various kinds of sandboxes. These all utilize static and dynamic analysis techniques to reveal […]
read more11/08/2022
Lesku Gergely –
When it comes to IT security, cybercrime prevention, or any other defensive measures organizations apply to protect themselves from hacker attacks, people usually think of firewalls, SIEM, SOAR, and XDR platforms, or even full-blown, high-tech security operation centers meticulously utilizing a combination of these pieces of technology. What’s interesting, however, is that hardly anyone thinks […]
read more18/05/2022
Polyák Beatrix –
This year we held the SOC Summit in person in Munich on April 28 and 29, but the participants could join our conference live in Budapest or online. These two days were special for us not only because we had an event abroad for the first time, but also we received the Authorized European MSSP […]
read more10/02/2022
Bernadett Bak –
Organized for the first time in 2019, Security Operations Center Summit Budapest quickly gained popularity in the cybersecurity community for being an outstanding platform for knowledge-sharing and collaboration. With more than 150 international participants joining the first event (even though it wasn’t even meant to be international), it instantly became one of the most important […]
read more08/12/2021
Gálffy Emese –
„We proudly announce that SOCWISE has been certified to ISO/IEC 27001:2013 international standard (ISMS). The preparation project ended with a successful audit, which resulted in the highlighting of several strengths. Such certification is a major milestone in the life of any organization, but in the cybersecurity industry, especially for a SOC, it is a basic […]
read more08/12/2021
Gálffy Emese –
Three-letter acronyms (or TLAs) have long ruled the IT sector, and the area of cybersecurity is no exception. As convenient as it is to shorten terms that would otherwise take much longer to say, there is undoubtedly another upside to resorting to TLAs when referring to solutions areas: a strong marketing aspect. In this article, […]
read more16/11/2021
Bernadett Bak –
In 2021, it doesn’t take much scrolling on the Internet to bump into the words ‘artificial intelligence’, and the probability of coming across this term significantly increases if you’re a seasoned professional in any IT-related field. As is the case in several other industries, AI has become a hot topic in the area of cybersecurity […]
read more02/11/2021
Bernadett Bak –
Gergely Lesku our WISE-ness developer at SOCWISE showed new tools, methods and forecasted trends regarding the dramatic changes in security work ahead of us at Cyber Security Summit. HOME ALONE 2021 We invested years and a ton of money to build up well guarded, physically and logically secure SOC facilities. We had to re-organize the […]
read more01/09/2021
Gálffy Emese –
In an era of ever-expanding attack surfaces, protecting against threat actors—from commodity malware, insider threats and crimeware to state-sponsored exploits, hacktivists and terrorists—has become an increasingly complex and time-consuming activity. Not all threats are created equal, and not all deserve your attention. Yet disconnected silos of prevention, monitoring and investigation technologies fail to weed out […]
read more