Cloud, Data Analysis, Cybersecurity

Skip to content
Menu
  • Home
  • Explore
  • Cloud
  • Splunk
  • Consultancy
  • Contact Us

Author: Sumesh MS

10 steps to Cyber Security

by Sumesh MSPosted onApril 12, 2018April 21, 2018

The actions and steps described below are in accordance with the guidelines from CESG UK and represent a good foundation for effective information risk management…

Read More

Beats – ELK

by Sumesh MSPosted onApril 4, 2018April 24, 2018

Beats Beats are lightweight data shipping agents installed on machines to send data to logstash or elasticsearch. Beats installed on multiple machines help to centralize…

Read More

USB Storage Device Monitoring using ELK

by Sumesh MSPosted onMarch 29, 2018April 24, 2018

USB storage devices are commonly used in almost all organizations to store or transfer data. These devices act as the primary sources of malware or…

Read More

Logstash GROK Filter

by Sumesh MSPosted onMarch 27, 2018April 24, 2018

Grok is a filter used by Logstash to parse unstructured data to structured format which is queryable by elasticsearch. Logstash comes with almost 120 patterns…

Read More

PHP-LDAP Authentication for Single Sign-On

by Sumesh MSPosted onMarch 26, 2018April 24, 2018

Implementation of LDAP-Authentication using php and OpenLDAP library which can be used for authentication of Active directory users in php forms. OpenLDAP Software is an…

Read More

ELK Stack installation on CENTOS using YUM

by Sumesh MSPosted onMarch 25, 2018April 24, 2018

ELK is the acronym for three open source projects: Elasticsearch, Logstash, and Kibana. Elasticsearch is a search and analytics engine and a NoSQL database that…

Read More

MAC Address to Vendors

by Sumesh MSPosted onMarch 23, 2018April 24, 2018

This is a simple python script that utilizes MAC to vendor API from macvendors.com to get the statistics of different devices connected to a network, especially…

Read More

Importance of Metrics in an IT Security Program

by Sumesh MSPosted onMarch 15, 2018April 24, 2018

Importance of metrics in an IT security program IT security metrics are widely used as the primary tools for decision making and evaluating accountability in…

Read More

Posts pagination

Previous Page Page 1 … Page 5 Page 6
  • Contact us
  • Team
  • Privacy Policy

2023 | www.cloudcybersafe.com

Cambium Theme by BestBlogThemes ⋅ Powered by WordPress