Author: ReZa AdineH
-
Threat Informed Defense (TID)
Threat Informed Defense (TID) is an approach to cybersecurity that prioritizes threat intelligence and threat modeling to develop and implement tailored security controls and response plans. TID enables organizations to detect, prevent, and respond to cyber threats more effectively, reducing the overall risk of a successful attack. One widely used framework for implementing TID is…
-
Cyber Threat Alignment for Detection efficiency
Abstract Cyber threats have become increasingly complex and sophisticated over the years, making it difficult for organizations to detect and prevent them. Cyber threat alignment is a critical aspect of cybersecurity that involves aligning an organization’s security measures with the latest cyber threats. The purpose of this paper is to provide a deep technical and…
-
Integrating Threat Intelligence and the Pyramid of Pain for Effective Threat Hunting
Introduction Threat hunting is the process of proactively searching for threats or suspicious activities that may have evaded existing security measures. Threat intelligence, on the other hand, refers to the information gathered and analyzed to identify potential threats to an organization. The combination of these two techniques can help organizations enhance their security posture and…
-
Designing an Effective Security Operations Center Architecture: Incorporating NIST CSF 5 Main Functions
Introduction A Security Operations Center (SOC) is a centralized team responsible for monitoring and analyzing an organization’s security posture. SOC architecture refers to the framework and components that are required to establish a comprehensive security posture. SOC architecture is composed of several layers, each with its own set of tools and technologies, and it is…
-
A quick review on Pyramid of pain
Introduction: The Pyramid of Pain is a framework used in the field of cybersecurity to help organizations better understand the tactics, techniques, and procedures (TTPs) used by attackers, and how to defend against them. It is called the “Pyramid of Pain” because it reflects the increasing level of effort and resources required by attackers to…
-
Using the MITRE ATT&CK Matrix for Effective Threat Hunting
Introduction Effective threat hunting is a proactive approach to cybersecurity that involves identifying and mitigating potential threats before they can cause harm to an organization’s systems and data. One advanced method of threat hunting is the use of the MITRE ATT&CK Matrix. The MITRE ATT&CK Matrix is a knowledge base of known adversary tactics, techniques,…
-
A quick guide on how to estimate Log Retention and log rotation policies
Step 1: Define Retention and Rotation Policies Step 2: Determine Event Size Step 3: Determine EPS (Events Per Second) Step 4: Determine Daily Disk Space Requirements Step 5: Compress Logs Step 6: Determine Storage Requirement for the Estimated Total Average EPS Here’s an example calculation based on the above policies: Note: These calculations are just…
-
A quick guideline for how to estimate or calculate your EPS or required capacity
To estimate the capacity required for log management, you need to determine the EPS and then calculate the amount of disk space needed to store the logs generated at that rate. Here’s a step-by-step guide: Step 1: Determine the EPS To determine the EPS, you need to know the number of events generated per second.…
-
A quick review on Anatomy of cyber attacks for beginners
Introduction As the world becomes increasingly interconnected through the internet, the threat of cyber attacks has grown exponentially. A cyber attack is a deliberate attempt to exploit vulnerabilities in computer systems, networks, or devices for malicious purposes. In this white paper, we will discuss the anatomy of a cyber attack, the different types of cyber…
-
Using Threat-Informed Detection Approaches for Implementing Prevention and Detection Solutions in a SOC and Mapping to the NIST CSF
Introduction: In today’s complex threat landscape, organizations must take a proactive approach to cybersecurity. Threat-informed detection and prevention approaches involve using threat intelligence to identify and respond to potential cybersecurity threats. Within a Security Operations Center (SOC), threat-informed approaches can be integrated into the incident response process to more effectively detect, respond to, and recover…