Sekoia.io builds a CTI (cyber threat intelligence) that aims to be operationalized into detection and hunting activities.| Sekoia.io Blog
RaaS is a software developed by cybercriminals that allows people to launch ransomware attacks without having any particular coding skills.| Sekoia.io
APT (Advanced Persistent Threat) is a sophisticated attack on an organization that can take months to identify and remove.| Sekoia.io
Learn about zero-day vulnerability, how they work, and why they pose a critical risk to cybersecurity. Essential insights.| Sekoia.io
Security Orchestration Automation and Response system covers three major functions: response, orchestration and automation of IT security.| Sekoia.io
Open XDR architecture is a framework designed to improve threat detection and incident response across an organization's entire IT ecosystem| Sekoia.io
STIX is an open standard describing objects of interest in the field of defensive computer warfare, and the links they can maintain between them.| Sekoia.io
Security Operations Center is an organizational structure dedicated to the implementation of an organization's security against cyberattacks| Sekoia.io
Discover the importance of IAM event detection and why it's vital to protecting digital assets from cyber threats.| Sekoia.io Blog
Get the power of a next-generation SIEM tool that can escalate events, detect anomalies and automate incident responses.| Sekoia.io
We provide cyber teams a turnkey cyber SOC to detect and respond to incidents, regardless of the attack surface.| Sekoia.io
Indicator of compromise is qualified technical data that makes it possible to detect malicious activities on an information system.| Sekoia.io