by Filip Nowak Security operations is subject to constraints, limitations and constant task reprioritization. This is especially true when developing Security Operations Center (SOC), shifting between initial levels of maturity and finding out what really slows down the effectiveness of the primary objectives. There is a common belief, that the technology....
Author
Latest Articles
- Our AuthorsFebruary 19, 2018Meet our expert - Cordny Nederkoorn
- BlogJuly 11, 2017For the Love of The Game by Jessica Gulick
- BlogJune 29, 2016Finding Advanced Malware Using Volatility
- BlogJuly 3, 2015Banana Pi Pro - Review
Subscribe
Login
0 Comments