CLOUDCYBERSAFE Examples

InfoSec Solutions, Thoughts and Innovation

We talk about Cloud Security Data Analysis CyberSecurity
The Elastic Stack is becoming increasingly popular with security analytics with any form of log inputs.  In this post, we
Read more
10 Things to know about Data Privacy Report compromised data: It is the law Customer loyalty is directly dependent on
Read more
Best Practice Cloud Cyber Security You cannot outsource accountability. Deployment Model Service Model Service Model Service Model Private IaaS PaaS
Read more
SSH is a widely used protocol for secure remote access and file transfers over untrusted networks. A Secure Shell (SSH)
Read more
Some of the basic question you should ask about data protection How information is governed at your business? Do you
Read more
Searches returns a SINGLE VALUE representing the number of items purchased? sourcetype=access_* action=purchase | stats count What kind of charts
Read more
Event logs are the valuable source of information in detecting and investigating security incidents. As part of the regulatory requirements
Read more
Docker is an operating system level virtualization platform for developers, operators, enterprises to develop, deploy, and run applications with containers.
Read more
Splunk Enterprise Installation Script This is a simple shell script for the installation Splunk enterprise in linux. Once the file
Read more
SPLUNK useful commands and Search List of commands for the installation of SPLUNK and Searching indexes sudo groupadd splunk grep
Read more
Logstash is a useful tool for processing log files that accept data from multiple sources and different formats. Logstash easly
Read more
Abstraction Involves the removal of characteristics from an entity in order to easily represent its essential properties. Acoustic Sensors Device
Read more
LDAP is the Lightweight Directory Access Protocol, a protocol used to access and manage Directory Servers such as Active directory.
Read more
Automated email notification for Active Directory User Locked Out and Password Reset events using Powershell. Windows Security Log Event ID
Read more
All-or-Nothing-Transform with Reed-Solomon (AONT-RS) Integrates the AONT and erasure coding. This method first encrypts and transforms the information and the
Read more
Elasticsearch Curator helps to curate, or manage, the Elasticsearch indices and snapshots by getting the full list of indices from
Read more
BEST PRACTICE Please Plan first based on your requirements and verify your plan. A single cluster or segregated clusters (
Read more
RSA is based on the great difficulty of integer factorization and is the most widely-used public-key cryptosystem used widely in
Read more
An Information Security Framework is designed to be flexible enough to be used both by organizations with mature cyber security
Read more
The actions and steps described below are in accordance with the guidelines from CESG UK and represent a good foundation
Read more