/

Security Operations

Security Operations

Learn about the vocabulary used to describe today’s most common cyber threats, from malware and phishing to advanced persistent attacks and zero-day exploits.

ECC Compliance requires implementing Essential Cybersecurity Controls (ECC 2-2024) to protect information and technology assets and reduce cyber risk. It establishes a structured baseline across governance, defense, resilience, and third-party security, with continuous monitoring and NDR-driven threat detection supporting visibility, incident response, and ongoing security improvement.

Network Behavior Anomaly Detection (NBAD) monitors network activity to identify deviations from normal behavior. By analyzing traffic patterns, protocols, and usage trends, it detects advanced threats and hidden risks. Within NDR environments, NBAD highlights anomalies, which are then correlated and investigated to provide deeper network visibility and context.

JA3 and JA3S fingerprinting analyze TLS handshake behavior to identify client and server communication in encrypted traffic. By focusing on connection patterns, they help detect malware, uncover anomalies, and support threat hunting and investigation without accessing payload data.

JA4 and JA4S TLS fingerprinting enable encrypted traffic analysis by identifying client and server behavior through handshake patterns. They help detect anomalies, uncover hidden threats, support threat hunting, and strengthen network security without requiring decryption of communication content.

sFlow and Full Packet Capture are network monitoring approaches. sFlow provides sampled visibility for detecting anomalies at scale, while Full Packet Capture records complete traffic for deep analysis and investigation. Together, they enable efficient detection, validation, and response in modern security operations.

Flow and Full Packet Capture are two approaches to network monitoring. Flows provide scalable visibility into communication patterns, while Full Packet Capture records complete traffic for deep analysis. Together, they enable detection of anomalies and full reconstruction of network activity for investigation and response.

The Pyramid of Pain explains why behavioral detection disrupts attackers more effectively than blocking static indicators like hashes or IPs. By focusing on tools, techniques, and tradecraft, organizations can reduce attacker dwell time, improve resilience, and build stronger, long-term cyber defenses. 

MTTD measures how long an organization takes to detect a security incident, showing the speed and effectiveness of its threat visibility.

Attack Timeline Reconstruction is the process of piecing together the sequence of events that occurred before, during, and after a cyberattack.