Best Practice Cloud Cyber Security You cannot outsource accountability. Deployment Model Service Model Service Model Service Model Private IaaS PaaS (Cloud OS) SaaS Public IaaS…
SSH is a widely used protocol for secure remote access and file transfers over untrusted networks. A Secure Shell (SSH) tunnel consists of an encrypted…
Some of the basic question you should ask about data protection How information is governed at your business? Do you classify your data, identifying sensitive…
Searches returns a SINGLE VALUE representing the number of items purchased? sourcetype=access_* action=purchase | stats count What kind of charts represent a series in a…
Event logs are the valuable source of information in detecting and investigating security incidents. As part of the regulatory requirements many companies collect and store…
Splunk Enterprise Installation Script This is a simple shell script for the installation Splunk enterprise in linux. Once the file is created make it executable…
SPLUNK useful commands and Search List of commands for the installation of SPLUNK and Searching indexes sudo groupadd splunk grep splunk /etc/group sudo useradd -g…