Explore
- Active directory (4)
- AlienVault (1)
- Android (1)
- apache (1)
- ASP.net (1)
- AWS (6)
- Azure (1)
- bcpdrp (1)
- Beats (1)
- boto3 (1)
- business continuity (1)
- C# (1)
- CCISO (2)
- CCSP (2)
- CISSP (1)
- Cloud (9)
- Cloud certification (1)
- Cloud security (7)
- Cordova (1)
- Curator (1)
- Cyber kids (2)
- Cyber parents (1)
- Cyber safety (3)
- Cybersecurity KPI (1)
- Data leakage (1)
- Data privacy (1)
- Docker (1)
- ec2 (1)
- Elastalert (1)
- Elasticsearch (10)
- ELK (11)
- email signature (0)
- esp8266 (2)
- GDPR (1)
- Google Finance (1)
- Graph API (1)
- greenbone (1)
- Group Policy (1)
- IIS (1)
- Information security (8)
- Intune (1)
- iot (2)
- IT metrics (2)
- itop (1)
- IT Security (1)
- LogonTracer (1)
- Log review (2)
- Logstash (3)
- McAfee (1)
- metricbeat (1)
- Mobile security (1)
- mqtt (2)
- MSP (1)
- Neo4j (1)
- network monitoring (2)
- php (2)
- php-ldap (2)
- Powershell (1)
- Python (5)
- rds (1)
- Risk assesment (3)
- RSA (1)
- Scripting (4)
- Search guard (1)
- Security incident (1)
- SIEM (6)
- SLA (1)
- Slack (1)
- snmp (1)
- Social Engineering (1)
- Sophos (1)
- Splunk (20)
- Splunk cluster (4)
- SQL Injection (1)
- SSH tunneling (1)
- SSL installation (1)
- sysvol replication (1)
- ubuntu (1)
- Virtualization (1)
- Vulnerabilities (2)
- Wazuh (1)
- Whatsapp (1)
- Windows (2)
- Work from Home (1)
ELK Stack installation on CENTOS using YUM
ELK is the acronym for three open source projects: Elasticsearch, Logstash, and Kibana. Elasticsearch is a search and analytics engine and a NoSQL database that…...
The Splunk search processing language
Searches are made up of this basic components Search terms – what are you looking for? -keywords, phrases, Booleans, etc. Commands – what do you…...
Risk and Challenges in Cloud
Security flaws in the hypervisor can lead to malicious software targeting individual VMs running on it or other components in the infrastructure. A flawed hypervisor…...
Data in Splunk Enterprise transitions through several phases.
Data in Splunk Enterprise transitions through several phases. Input Parsing Indexing Search Three key functions as it move data through the data pipeline. First, it…...
MAC Address to Vendors
This is a simple python script that utilizes MAC to vendor API from macvendors.com to get the statistics of different devices connected to a network, especially…...