osquery + OpenTelemetry = ❤️ Post date November 16, 2025 Post author By Adam Gardner Post categories In devsecops, soc, tools
Why Embedded Android SBCs Are Powering the Next Generation of Smart Devices Post date September 26, 2025 Post author By Kevin zhang Post categories In ai, android, sbc, soc
How to Manage Security Vulnerabilities Using Budibase—No Code Required Post date August 6, 2025 Post author By Mikhail Alekseev Post categories In budibase, cybersecurity, infosec, no-code-platform, soc, vibe-coding, vulnerability-dashboard, vulnerability-management
Wazuh 101: How I Got My SIEM Setup Working in One Afternoon Post date July 4, 2025 Post author By Shahzaib Ahmed Post categories In cybersecurity, kali-linux, soc, step-by-step-guide, wazuh, wazuh-agent-installation, Windows, windows-10
Integrating SOAR with Existing Security Systems Post date September 13, 2024 Post author By Anastasios Arampatzis Post categories In cybersecurity, cybersecurity-tools, security-automation, security-orchestration, soar, soar-integration, soc, threat-detection
Single Responsibility vs Separation of Concerns Post date February 19, 2022 Post author By Yani A. Post categories In oop, principles, soc, solid
What is SOC 2 and Why is it Important for Businesses? Post date June 3, 2021 Post author By Secureframe Post categories In cybersecurity, cybersecurity-compliance, data-privacy-compliance, good-company, security, soc, soc-2-audit, soc2-compliance
Understanding The Importance of SOC2 Compliance for Data Centers Post date February 21, 2021 Post author By Narendra Sahoo Post categories In audit, compliance, cybersecurity, data-centers, data-secuity, information-security, soc, soc2-compliance