CLOUDCYBERSAFE Examples
InfoSec Solutions, Thoughts and Innovation
We talk about
Cloud Security
Data Analysis
CyberSecurity

Mobile Device Security Organizational Concern – pose a risk in data security when device used and transported outside physical boundaries
The Elastic Stack is becoming increasingly popular with security analytics with any form of log inputs. In this post, we
10 Things to know about Data Privacy Report compromised data: It is the law Customer loyalty is directly dependent on
Best Practice Cloud Cyber Security You cannot outsource accountability. Deployment Model Service Model Service Model Service Model Private IaaS PaaS
SSH is a widely used protocol for secure remote access and file transfers over untrusted networks. A Secure Shell (SSH)
Some of the basic question you should ask about data protection How information is governed at your business? Do you
Searches returns a SINGLE VALUE representing the number of items purchased? sourcetype=access_* action=purchase | stats count What kind of charts
Event logs are the valuable source of information in detecting and investigating security incidents. As part of the regulatory requirements
Splunk Enterprise Installation Script This is a simple shell script for the installation Splunk enterprise in linux. Once the file
SPLUNK useful commands and Search List of commands for the installation of SPLUNK and Searching indexes sudo groupadd splunk grep
Logstash is a useful tool for processing log files that accept data from multiple sources and different formats. Logstash easly
Abstraction Involves the removal of characteristics from an entity in order to easily represent its essential properties. Acoustic Sensors Device
LDAP is the Lightweight Directory Access Protocol, a protocol used to access and manage Directory Servers such as Active directory.
Automated email notification for Active Directory User Locked Out and Password Reset events using Powershell. Windows Security Log Event ID
All-or-Nothing-Transform with Reed-Solomon (AONT-RS) Integrates the AONT and erasure coding. This method first encrypts and transforms the information and the
Elasticsearch Curator helps to curate, or manage, the Elasticsearch indices and snapshots by getting the full list of indices from
BEST PRACTICE Please Plan first based on your requirements and verify your plan. A single cluster or segregated clusters (
RSA is based on the great difficulty of integer factorization and is the most widely-used public-key cryptosystem used widely in
An Information Security Framework is designed to be flexible enough to be used both by organizations with mature cyber security



















