The actions and steps described below are in accordance with the guidelines from CESG UK and represent a good foundation for effective information risk management…
Beats Beats are lightweight data shipping agents installed on machines to send data to logstash or elasticsearch. Beats installed on multiple machines help to centralize…
USB storage devices are commonly used in almost all organizations to store or transfer data. These devices act as the primary sources of malware or…
Grok is a filter used by Logstash to parse unstructured data to structured format which is queryable by elasticsearch. Logstash comes with almost 120 patterns…
Implementation of LDAP-Authentication using php and OpenLDAP library which can be used for authentication of Active directory users in php forms. OpenLDAP Software is an…
ELK is the acronym for three open source projects: Elasticsearch, Logstash, and Kibana. Elasticsearch is a search and analytics engine and a NoSQL database that…
This is a simple python script that utilizes MAC to vendor API from macvendors.com to get the statistics of different devices connected to a network, especially…
Importance of metrics in an IT security program IT security metrics are widely used as the primary tools for decision making and evaluating accountability in…