Explore


Critical Log Review Checklist for Security Incidents

This is a checklist for reviewing critical logs when responding to a security incident. It can also be used for routine log review. General Approach…...

Read More

Safety Tips for Parents: Cyberbullying

Safety Tips for Parents: Cyberbullying Cyberbullying is any form of bullying which takes place over digital devices like cell phones, computers, and tablets and it…...

Read More

AWS TERMS

AWS TERMS API Gateway  Amazon API Gateway makes it easy to create, maintain, monitor, and secure APIs at any scale. AppStream  Amazon AppStream lets you…...

Read More

Search Guard Installation for ELK Stack

Search Guard Installation and Concepts Search Guard is an Open Source Elasticsearch plugin that offers encryption, authentication, and authorization and can be used to secure…...

Read More

Why AWS?

  The AWS Well-Architected Framework is based on five pillars — operational excellence, security, reliability, performance efficiency, and cost optimization. Pillar Name Description Operational Excellence…...

Read More