Explore


Critical Log Review Checklist for Security Incidents

Critical Log Review Checklist for Security Incidents

This is a checklist for reviewing critical logs when responding to a security incident. It can also be used for routine log review. General Approach… ...
Safety Tips for Parents: Cyberbullying

Safety Tips for Parents: Cyberbullying

Safety Tips for Parents: Cyberbullying Cyberbullying is any form of bullying which takes place over digital devices like cell phones, computers, and tablets and it… ...
AWS TERMS

AWS TERMS

AWS TERMS API Gateway  Amazon API Gateway makes it easy to create, maintain, monitor, and secure APIs at any scale. AppStream  Amazon AppStream lets you… ...
Search Guard Installation for ELK Stack

Search Guard Installation for ELK Stack

Search Guard Installation and Concepts Search Guard is an Open Source Elasticsearch plugin that offers encryption, authentication, and authorization and can be used to secure… ...
Why AWS?

Why AWS?

  The AWS Well-Architected Framework is based on five pillars — operational excellence, security, reliability, performance efficiency, and cost optimization. Pillar Name Description Operational Excellence… ...