CLOUDCYBERSAFE Examples

InfoSec Solutions, Thoughts and Innovation
We talk about Cloud Security Data Analysis CyberSecurity
Logstash is a useful tool for processing log files that accept data from multiple sources and different formats. Logstash easly
Read more
Abstraction Involves the removal of characteristics from an entity in order to easily represent its essential properties. Acoustic Sensors Device
Read more
LDAP is the Lightweight Directory Access Protocol, a protocol used to access and manage Directory Servers such as Active directory.
Read more
Automated email notification for Active Directory User Locked Out and Password Reset events using Powershell. Windows Security Log Event ID
Read more
All-or-Nothing-Transform with Reed-Solomon (AONT-RS) Integrates the AONT and erasure coding. This method first encrypts and transforms the information and the
Read more
Elasticsearch Curator helps to curate, or manage, the Elasticsearch indices and snapshots by getting the full list of indices from
Read more
BEST PRACTICE Please Plan first based on your requirements and verify your plan. A single cluster or segregated clusters (
Read more
RSA is based on the great difficulty of integer factorization and is the most widely-used public-key cryptosystem used widely in
Read more
An Information Security Framework is designed to be flexible enough to be used both by organizations with mature cyber security
Read more
The actions and steps described below are in accordance with the guidelines from CESG UK and represent a good foundation
Read more
TANIUM CORE (Endpoint Security and Endpoint Management ) Ask Know Act  The platform for manageability and security The best endpoint
Read more
What is a Virtual Private Cloud? If you host it in amazon IaaS (aws) it is called VPC. Logically isolated
Read more
Splunk listens to your data. What story are we trying to tell? What visualization that story best? What is the
Read more
To deploy a multisite cluster, you configure the set of nodes for each site: A single master resides on one
Read more
Beats Beats are lightweight data shipping agents installed on machines to send data to logstash or elasticsearch. Beats installed on
Read more
Splunk Enterprise stores all of the data it processes in indexes. An index is a collection of databases, which are
Read more
The EU General Data Protection Regulation (GDPR) On 25 May 2018, the most significant piece of European data protection legislation
Read more
Daily logs GB After compression and TSIDX creation your data will be 75% of its original size Data Retention number
Read more
The CCSP is a global credential that represents the highest standard for cloud security expertise. It was co-created by (ISC)²
Read more
Architecting Splunk Deployment Scale Splunk Enterprise functionality to handle the data needs for enterprises of any size and complexity. Access
Read more