J3bitokjebitok.hashnode.dev·Nov 3, 2024Security Solutions: Vulnerability Scanner OverviewIn this article, I will write a write-up for Vulnerability Scanner Overview that covers What Are Vulnerabilities, Vulnerability Scanning, Tools for Vulnerability Scanning, CVE & CVSS, and OpenVAS. What is the process of fixing the vulnerabilities ca...Discuss#cybersecurity
J3bitokjebitok.hashnode.dev·Nov 3, 2024Security Solutions: Introduction to SIEM (TryHackMe)In this article, I will write a write-up for Introduction to SIEM that covers Network Visibility through SIEM, Log Sources and Log Ingestion, Why SIEM, Analysing Logs and Alerts, and Lab Work. What does SIEM stand for? Security Information and Event...DiscussSIEM
Jiyajiyajha.hashnode.dev·Jun 6, 2024Big Data, Big Threats: Understanding the Urgency of Data SecurityThe term big data security refers to the collection of safeguards and instruments used to protect analytics and data from theft, attacks, and other malicious activity that could harm or negatively impact them. Big Data deployments are attractive targ...Discussbigdatasecurity
Sumit Mondalsumit007.hashnode.dev·Jan 26, 2024Demystifying Cloud HSM Implementation in AWS: A Step-by-Step GuideIntroduction: In the world of cloud computing, security is paramount. Safeguarding sensitive data and cryptographic keys is a critical concern for businesses operating in the cloud. One powerful solution to address these security needs is the use of ...DiscussAWS - HandsOn#CryptographicKeys