SSH is a widely used protocol for secure remote access and file transfers over untrusted networks. A Secure Shell (SSH) tunnel consists of an encrypted…
Event logs are the valuable source of information in detecting and investigating security incidents. As part of the regulatory requirements many companies collect and store…
Logstash is a useful tool for processing log files that accept data from multiple sources and different formats. Logstash easly process text-based logs and send…
LDAP is the Lightweight Directory Access Protocol, a protocol used to access and manage Directory Servers such as Active directory. The Directory is a special…
Automated email notification for Active Directory User Locked Out and Password Reset events using Powershell. Windows Security Log Event ID 4740 indicates that a user…
Elasticsearch Curator helps to curate, or manage, the Elasticsearch indices and snapshots by getting the full list of indices from the Elasticsearch cluster as actionable…
RSA is based on the great difficulty of integer factorization and is the most widely-used public-key cryptosystem used widely in e-commerce systems. Euclid algorithm and…
An Information Security Framework is designed to be flexible enough to be used both by organizations with mature cyber security and risk management programs and…