{"id":56523,"date":"2024-07-09T00:00:00","date_gmt":"2024-07-09T00:00:00","guid":{"rendered":"urn:uuid:2bbebac1-744a-ceab-0015-f8c6a2812fc7"},"modified":"2024-07-09T00:00:00","modified_gmt":"2024-07-09T00:00:00","slug":"network-detection-response-the-soc-stress-reliever","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/network-detection-response-the-soc-stress-reliever\/","title":{"rendered":"Network detection &amp; response: the SOC stress reliever"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/network-detection-response-2024-tn:Large?qlt=80\"><\/p>\n<div><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/thumbnails\/24\/network-detection-response-2024-tn.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>Companies are spending billions on cybersecurity and still getting breached\u2014partly because the attack surface keeps growing and partly because the network is full of unmanaged devices that are ideal targets for bad actors. To eliminate those hiding places, top analysts are advising organizations to add network detection and response (NDR) capabilities to their cybersecurity mix.<\/p>\n<p>High-stress white-knuckle workplaces like nuclear plants and air traffic control towers have gotten the Hollywood treatment in countless movies about sweat-soaked technicians managing chaos and fighting the clock while the world outside carries on oblivious. The way things are going, enterprise security operations centers (SOCs) more than deserve the same kind of edge-of-your-seat recognition.<\/p>\n<p>Today\u2019s SOCs are under incredible pressure to fend off threats that most of an organization\u2019s employees will never hear about\u2014unless an attack succeeds. They\u2019re supremely aware of the high cost of failure and in a constant scramble to prioritize the right risks and act fast.<\/p>\n<p>Fortunately, SOCs have some smart and powerful tools to help them. Endpoint detection and response (EDR) technologies have proven highly effective at catching threats in devices under enterprise management. The problem is that more and more unmanaged devices are accessing corporate networks and creating openings for bad actors. Hence the need for the farther-reaching capabilities of network detection and response (NDR) solutions.<\/p>\n<p><span class=\"body-subhead-title\">Why network detection and response tools are essential<\/span><\/p>\n<p>Only a small percentage of connected devices will ever access a corporate network. But with the overall number of devices on the planet expected to reach <a href=\"https:\/\/www.statista.com\/statistics\/245501\/multiple-mobile-device-ownership-worldwide\/\" target=\"_blank\" rel=\"noopener\">18.2 billion by 2025<\/a>, even if a fraction of that \u201csmall percentage\u201d is on the corporate network and unmanaged, it will mean huge security headaches for SOC staff.<\/p>\n<p>Unmanaged assets are great places for attackers to lie low. They can take almost any form: previously managed devices with lapsed security agents; bring-your-own devices; routers and other network equipment; and smart devices like thermostats and connected medical equipment.<\/p>\n<p>Because they\u2019re unmanaged, these assets are hard to upgrade or patch and aren\u2019t scanned for vulnerabilities. Some simply <i>can\u2019t<\/i> be managed, either because they\u2019re not sophisticated enough to host a security agent or because scanning or modifying them is prohibited by regulations, as is the case in Canada with some medical equipment.<\/p>\n<p>These unmanaged assets are proliferating throughout the enterprise IT environment at the same time that networks themselves are becoming harder and harder to protect. Boundaries are dissolving, especially with the surge in remote and hybrid work. According to <a href=\"https:\/\/www.mckinsey.com\/industries\/real-estate\/our-insights\/americans-are-embracing-flexible-work-and-they-want-more-of-it\" target=\"_blank\" rel=\"noopener\">McKinsey<\/a>, 58% of the U.S. workforce is already remote. The network has no perimeter.<\/p>\n<p>Cybersecurity teams can no longer hope to simply \u201ckeep the bad guys out.\u201d EDR can detect malicious activity in managed assets and observe anomalies moving between managed to unmanaged devices , but once a threat is hiding in the unmanaged weeds, it\u2019s basically untraceable. On top of that, attackers excel at hiding in plain sight, using normal tools and applications to move around the network. Many lie low for weeks or months after a breach to avoid detection before unleashing their attacks.<\/p>\n<p>SOC teams can monitor for suspicious lateral movements, but often they can\u2019t know for sure what the network traffic contains because most of it\u2014including 95% of web traffic according to Google\u2014is encrypted.<\/p>\n<p>NDR solutions help close the gaps by making unmanaged assets visible.<\/p>\n<p><span class=\"body-subhead-title\">In search of lurking threats<\/span><\/p>\n<p>As an approach, NDR focuses on monitoring, detecting, and responding to threats and anomalies in the network\u2014in real time.&nbsp;It uses sophisticated technologies and methodologies to identify and deal with potential threats that traditional security measures might miss.&nbsp;&nbsp;<\/p>\n<p>NDR approaches include continuous traffic monitoring and analysis with deep packet inspection, behavioral analytics, and machine learning informed by threat intelligence to identify anomalies and possible threats.<\/p>\n<p>Industry analysts have weighed in on what NDR solutions need to fully and most effectively manage risk. <a href=\"https:\/\/www.trendmicro.com\/explore\/forrester-wave-xdr\/2261-tl-en-rpt\" target=\"_blank\" rel=\"noopener\">Forrester<\/a> has called for a few key additional capabilities: integrated decryption to see into network and web traffic, an ability to support zero-trust approaches, and\u2014importantly\u2014prioritization of the SOC analyst experience, with the aim of preventing SOC staff from being overwhelmed by data and alerts.<\/p>\n<p><a href=\"https:\/\/www.gartner.com\/doc\/reprints?id=1-2HDZIED1&amp;ct=240424&amp;st=sb\" target=\"_blank\" rel=\"noopener\">Gartner<\/a> notes that while AI and machine learning are must-haves for any NDR solution, threat intelligence is also required to evaluate the data against real-world risks, and cross-layer correlation is needed to reduce the number of alerts overall and bring greater accuracy to threat detection.<\/p>\n<p><span class=\"body-subhead-title\">A SOC stress reliever<\/span><\/p>\n<p>By combining real-time monitoring and automated response capabilities, NDR empowers enterprises to defend more fully against sophisticated cyber threats and minimize the potential impact of security incidents.<\/p>\n<p>Given the changes in the enterprise attack surface, NDR is a key part of managing attack surface risk\u2014bringing XDR capabilities to network protection and making it easier for SOC teams to do their jobs well with less stress. With tools like these, maybe the SOC won\u2019t end up being the subject of a Hollywood nailbiter after all.<\/p>\n<p><span class=\"body-subhead-title\">Further insights<\/span><\/p>\n<p>For more on NDR and related topics, check out these additional resources:<\/p>\n<p> Read More <a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/24\/g\/network-detection-response-2024.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity teams are well-equipped to handle threats to technology assets that they manage. But with unmanaged devices providing ideal spots for attackers to lurk unseen, network detection and response capabilities have become vitally important. Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":56524,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[9510,9521,9511,9508,9555,9523,9532],"class_list":["post-56523","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-trend-micro-research-articles-news-reports","tag-trend-micro-research-cyber-crime","tag-trend-micro-research-cyber-threats","tag-trend-micro-research-endpoints","tag-trend-micro-research-exploitsvulnerabilities","tag-trend-micro-research-network","tag-trend-micro-research-security-strategies"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Network detection &amp; response: the SOC stress reliever 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/network-detection-response-the-soc-stress-reliever\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Network detection &amp; response: the SOC stress reliever 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/network-detection-response-the-soc-stress-reliever\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2024-07-09T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/network-detection-response-2024-tn:Large?qlt=80\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/network-detection-response-the-soc-stress-reliever\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/network-detection-response-the-soc-stress-reliever\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Network detection &amp; response: the SOC stress reliever\",\"datePublished\":\"2024-07-09T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/network-detection-response-the-soc-stress-reliever\\\/\"},\"wordCount\":852,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/network-detection-response-the-soc-stress-reliever\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/network-detection-response-the-soc-stress-reliever.jpg\",\"keywords\":[\"Trend Micro Research : Articles, News, Reports\",\"Trend Micro Research : Cyber Crime\",\"Trend Micro Research : Cyber Threats\",\"Trend Micro Research : Endpoints\",\"Trend Micro Research : Exploits&amp;Vulnerabilities\",\"Trend Micro Research : Network\",\"Trend Micro Research : Security Strategies\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/network-detection-response-the-soc-stress-reliever\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/network-detection-response-the-soc-stress-reliever\\\/\",\"name\":\"Network detection &amp; response: the SOC stress reliever 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/network-detection-response-the-soc-stress-reliever\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/network-detection-response-the-soc-stress-reliever\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/network-detection-response-the-soc-stress-reliever.jpg\",\"datePublished\":\"2024-07-09T00:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/network-detection-response-the-soc-stress-reliever\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/network-detection-response-the-soc-stress-reliever\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/network-detection-response-the-soc-stress-reliever\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/network-detection-response-the-soc-stress-reliever.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/network-detection-response-the-soc-stress-reliever.jpg\",\"width\":977,\"height\":534},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/network-detection-response-the-soc-stress-reliever\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trend Micro Research : Articles, News, Reports\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/trend-micro-research-articles-news-reports\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Network detection &amp; response: the SOC stress reliever\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Network detection &amp; response: the SOC stress reliever 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/network-detection-response-the-soc-stress-reliever\/","og_locale":"en_US","og_type":"article","og_title":"Network detection &amp; response: the SOC stress reliever 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/network-detection-response-the-soc-stress-reliever\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2024-07-09T00:00:00+00:00","og_image":[{"url":"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/network-detection-response-2024-tn:Large?qlt=80","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/network-detection-response-the-soc-stress-reliever\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/network-detection-response-the-soc-stress-reliever\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Network detection &amp; response: the SOC stress reliever","datePublished":"2024-07-09T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/network-detection-response-the-soc-stress-reliever\/"},"wordCount":852,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/network-detection-response-the-soc-stress-reliever\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/07\/network-detection-response-the-soc-stress-reliever.jpg","keywords":["Trend Micro Research : Articles, News, Reports","Trend Micro Research : Cyber Crime","Trend Micro Research : Cyber Threats","Trend Micro Research : Endpoints","Trend Micro Research : Exploits&amp;Vulnerabilities","Trend Micro Research : Network","Trend Micro Research : Security Strategies"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/network-detection-response-the-soc-stress-reliever\/","url":"https:\/\/www.threatshub.org\/blog\/network-detection-response-the-soc-stress-reliever\/","name":"Network detection &amp; response: the SOC stress reliever 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/network-detection-response-the-soc-stress-reliever\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/network-detection-response-the-soc-stress-reliever\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/07\/network-detection-response-the-soc-stress-reliever.jpg","datePublished":"2024-07-09T00:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/network-detection-response-the-soc-stress-reliever\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/network-detection-response-the-soc-stress-reliever\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/network-detection-response-the-soc-stress-reliever\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/07\/network-detection-response-the-soc-stress-reliever.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/07\/network-detection-response-the-soc-stress-reliever.jpg","width":977,"height":534},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/network-detection-response-the-soc-stress-reliever\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Trend Micro Research : Articles, News, Reports","item":"https:\/\/www.threatshub.org\/blog\/tag\/trend-micro-research-articles-news-reports\/"},{"@type":"ListItem","position":3,"name":"Network detection &amp; response: the SOC stress reliever"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/56523","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=56523"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/56523\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/56524"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=56523"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=56523"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=56523"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}