Youssef Ketajstarter-kit-xi-seven.vercel.app·Jan 30, 2025Building a Comprehensive Open Source SIEM SolutionIntroduction In today's cybersecurity landscape, having a robust Security Information and Event Management (SIEM) system is crucial for organizations of all sizes. While commercial SIEM solutions can be expensive and complex, this guide demonstrates ...SIEM
Mahdi Bagherimahdibagheri.hashnode.dev·Jan 28, 2025Begin Security Monitoring with WazuhIntroduction Wazuh is a monitoring solution with focus on security, combining features for XDR (Extended Detection and Response) and SIEM (Security Information and Event Management) into one platform. And the best part is, it’s free and open source. ...Projectswazuh
Stellar Cyberstellarcyber.hashnode.dev·Jan 11, 2025SecOps Automation: Use Cases, ChallengesLearn what SecOps automation is, the various use cases for SecOps automation, and how Stellar Cyber can help organizations overcome key SecOps automation challenges. Read Full ArticleSIEM
Stellar Cyberstellarcyber.hashnode.dev·Jan 11, 2025The Power of Partnership: How Armis and Stellar Cyber Combine Forces to Redefine Security OperationsWhen it comes to cybersecurity, Armis and Stellar Cyber bring something unique to the table. Armis, a recognized leader in asset visibility and management, empowers organizations with real-time, comprehensive visibility across all devices—whether in ...SIEM
Stellar Cyberstellarcyber.hashnode.dev·Dec 19, 2024SIEM Correlation Rules: Enhancing Your Threat DetectionLogs represent the real-time activities of every single corner of your enterprise. Each audit log contains the information of a user’s activity, parameters, resources, and timing, making them a veritable goldmine of data. Read Full ArticleSIEM
ConradWilliamcxnrvd.hashnode.dev·Dec 12, 2024Day 2 - Investigating Suspicious Activity with Elastic SIEMIn today's cybersecurity landscape, SIEM (Security Information and Event Management) systems play a critical role in detecting, investigating, and responding to threats. In this blog post, we will walk you through a detailed investigation using Elast...Advent of Cyber 2024SIEM
J3bitokjebitok.hashnode.dev·Dec 5, 2024The Advent of Cyber: Day 2: Log Analysis - One Man's False Positive is Another Man's Potpourri (TryHackMe)In this article, we’ll cover the Log Analysis—One Man's False Positive is Another Man's Potpourri writeup as the Day 2 challenge of the Advent of Cyber event challenge. It was interesting to navigate the platform and filter different events and logs ...elastic-security
Ze Coutoprotocol-udp.hashnode.dev·Nov 12, 2024Simple and Easy Elastic SIEM LabIn this guide, I'll show you how to set up a home lab for Elastic Stack Security Information and Event Management (SIEM) using the Elastic web portal and a Kali Linux virtual machine (VM). You'll also learn how to create security events on the Kali V...161 reads#cybersecurity
J3bitokjebitok.hashnode.dev·Nov 3, 2024Security Solutions: Introduction to SIEM (TryHackMe)In this article, I will write a write-up for Introduction to SIEM that covers Network Visibility through SIEM, Log Sources and Log Ingestion, Why SIEM, Analysing Logs and Alerts, and Lab Work. What does SIEM stand for? Security Information and Event...SIEM
alice eneyoaliyo.hashnode.dev·Sep 20, 2024How To Use a Siem tool in a real-life situationgoogle pics In this guide, I’ll walk you through the steps to set up a home lab for Elastic Stack Security Information and Event Management (SIEM) using AWS EC2 Ubuntu and Elastic Cloud. You’ll also learn how to generate security events, configure an...elasticcloud