Cloud, Data Analysis, Cybersecurity

Skip to content
Menu
  • Home
  • Explore
  • Cloud
  • Splunk
  • Consultancy
  • Contact Us

Author: Sumesh MS

ASP.NET Weblogin Using Python

by Sumesh MSPosted onJuly 4, 2018July 4, 2018

ASP.NET Weblogin Using Python ASP.net websites usually send state data in requests and responses in order to keep track of the client’s UI state. An…

Read More

Signing APKs with Java KeyTool

by Sumesh MSPosted onJune 21, 2018

For publishing an APK  in Google Play app signing by Google Play is not mandatory and we can use our own keys. This example shows…

Read More

Critical Log Review Checklist for Security Incidents

by Sumesh MSPosted onJune 13, 2018June 13, 2018

This is a checklist for reviewing critical logs when responding to a security incident. It can also be used for routine log review. General Approach…

Read More

Safety Tips for Parents: Cyberbullying

by Sumesh MSPosted onJune 10, 2018

Safety Tips for Parents: Cyberbullying Cyberbullying is any form of bullying which takes place over digital devices like cell phones, computers, and tablets and it…

Read More

Search Guard Installation for ELK Stack

by Sumesh MSPosted onJune 4, 2018June 21, 2018

Search Guard Installation and Concepts Search Guard is an Open Source Elasticsearch plugin that offers encryption, authentication, and authorization and can be used to secure…

Read More

Cyber Safety Tips for Parents

by Sumesh MSPosted onMay 30, 2018May 30, 2018

1. Start Early and Keep Talking: Many kids are given their first tablet or Internet-connected device before they can fully comprehend the power in their…

Read More

Service Level Agreements – Things to Remember

by Sumesh MSPosted onMay 27, 2018May 27, 2018

Every service contracts with a managed service provider (MSP) should be regulated by an SLA (Service Level Agreement). Without a properly drafted SLA it is…

Read More

Security Monitoring with WAZUH and ELK

by Sumesh MSPosted onMay 23, 2018

Wazuh is a popular open source security detection, visibility, and compliance project which was born as a fork of OSSEC HIDS, and integrates with Elastic…

Read More

WhatsApp Group Chat Analysis using ELK

by Sumesh MSPosted onMay 13, 2018May 13, 2018

The Elastic Stack is becoming increasingly popular with security analytics with any form of log inputs.  In this post, we learn about how ELK can…

Read More

Posts pagination

Previous Page Page 1 … Page 3 Page 4 Page 5 Page 6 Next Page
  • Contact us
  • Team
  • Privacy Policy

2023 | www.cloudcybersafe.com

Cambium Theme by BestBlogThemes ⋅ Powered by WordPress