Cloud, Data Analysis, Cybersecurity

Skip to content
Menu
  • Home
  • Explore
  • Cloud
  • Splunk
  • Consultancy
  • Contact Us

Month: March 2018

Splunk Universal forwarder on Linux

by Upen PatelPosted onMarch 26, 2018April 24, 2018

Universal forwarder on Linux Splunk universal forwarder is a best and performance reliable method to forward logs to an indexer which will act as an…

Read More

ELK Stack installation on CENTOS using YUM

by Sumesh MSPosted onMarch 25, 2018April 24, 2018

ELK is the acronym for three open source projects: Elasticsearch, Logstash, and Kibana. Elasticsearch is a search and analytics engine and a NoSQL database that…

Read More

The Splunk search processing language

by Upen PatelPosted onMarch 24, 2018April 24, 2018

Searches are made up of this basic components   Search terms – what are you looking for? -keywords, phrases, Booleans, etc. Commands – what do you…

Read More

Risk and Challenges in Cloud

by Upen PatelPosted onMarch 24, 2018April 24, 2018

Security flaws in the hypervisor can lead to malicious software targeting individual VMs running on it or other components in the infrastructure. A flawed hypervisor…

Read More

Data in Splunk Enterprise transitions through several phases.

by Upen PatelPosted onMarch 24, 2018April 24, 2018

Data in Splunk Enterprise transitions through several phases. Input Parsing Indexing Search Three key functions as it move data through the data pipeline.  First, it…

Read More

MAC Address to Vendors

by Sumesh MSPosted onMarch 23, 2018April 24, 2018

This is a simple python script that utilizes MAC to vendor API from macvendors.com to get the statistics of different devices connected to a network, especially…

Read More

Risk Assessment

by Upen PatelPosted onMarch 21, 2018April 24, 2018

Risk assessment is a key component of holistic, organization-wide risk management process. Risk Management Processes include: Framing Risk Assessing risk Responding to risk Monitoring risk.…

Read More

Splunk Enterprise Security

by Upen PatelPosted onMarch 21, 2018April 24, 2018

Splunk Enterprise Security should be on the search head. You will need one dedicated server to be the search head. Domain add-ons, Support add-ons, and…

Read More

Common Threats in Cloud

by Upen PatelPosted onMarch 20, 2018April 24, 2018

Many of the top risks identified in the “CLOUD SECURITY ALLIANCE the Notorious Nine: Data Breaches Data Loss Account or Service Traffic Hijacking Insecure Interface…

Read More

Posts pagination

Previous Page Page 1 Page 2 Page 3 Next Page
  • Contact us
  • Team
  • Privacy Policy

2023 | www.cloudcybersafe.com

Cambium Theme by BestBlogThemes ⋅ Powered by WordPress