Identifying intrusion events based on source technologies
As a cybersecurity professional, you will most likely be working within a type of security operation center (SOC), whether it's an in-house team or within a managed security service provider (MSSP). Regardless of the environment, you'll be exposed to many networking and security technologies and devices that are used to gather data about the network traffic. Such data is usually fed into Security Information and Event Management (SIEM) software and other threat management tools such as Security Orchestration, Automation, and Response (SOAR) tools.
The SIEM application is responsible for correlating all the events gathered from all networking and security devices within an organization and provides visibility of all potential security incidents that are occurring in real time. This allows security professionals to quickly see attacks as they are happening and gather details using a single pane of glass rather than...