Alvin Leealvinslee.hashnode.dev·Dec 1, 2023Understanding the New SEC Rules for Disclosing Cybersecurity IncidentsThe U.S. Securities and Exchange Commission (SEC) recently announced its new rules for public companies regarding cybersecurity risk management, strategy, governance, and incident exposure. Some requirements apply to this year—for example, disclosure...Discuss#cybersecurity
Billy Gajan Waranicecappman.hashnode.dev·Nov 16, 2023Harmonizing Cybersecurity: The Crucial Role of SIEMIntroduction: In the ever-shifting landscape of cybersecurity, organizations grapple with a myriad of threats and vulnerabilities. Meeting these challenges head-on demands sophisticated tools and frameworks, and one such indispensable component is th...DiscussSIEM
Brandon Daleybrandon-daley.hashnode.dev·Oct 29, 2023Azure Sentinel - Live Cyber Attack MapIntro In this article, I will be going over how to setup an intentionally vulnerable virtual machine within Azure. We will then ingest the logs from this VM into a Log Analytics Workspace (LAW), transform the data, and export it to Sentinel for visua...DiscussAzure
Taner Metintanerjn.hashnode.dev·Sep 21, 2023Splunk vs. Datadog vs. GrafanaCisco's acquisition of Splunk today(21, Sept) will probably not be the end for Splunk but a new beginning as more and more of the things become represented with digits and colours we(engineers) use daily to keep us awake of what's happening under the...Discussmonitoring
Maik Romaikroservice.com·Aug 29, 2023How to get started with Monitoring on the Blue Team: A Step-By-Step GuideFirst up - What is the Blue Team anyway? Good Question - the Blue Team is typically not just a single team. It is a combination of multiple security disciplines combined for ease of speech. Similar to how Red Team sometimes means pentester as well. W...Discuss·474 readsSIEM
Maik Romaikroservice.com·Aug 25, 2023Setting Up Wazuh as Your SIEM on Debian 12 & Proxmox: A Step-by-Step GuideWelcome to the SIEM Homelab Series - We will walk through the process of installing your very own instance of Wazuh as a Security Information and Event Management System (SIEM). If you want to do threat research or learn more about the ins and outs o...Discuss·1 like·6.4K readsSIEM
WhatDoesKmean?loggar.hashnode.dev·Aug 16, 2023The LLM-Powered SIEMIntro A few weeks ago, I came across an insightful comment in a forum: "I'm not sure how to feel about providing critical information about my infrastructure with potential vulnerabilities to a third-party app like ChatGPT." This comment highlights a...Discuss·864 readsSIEM
Kerwintriminator.hashnode.dev·Jul 5, 2023Azure Sentinel Map with Live Attack DataHey Everyone! I was inspired to do this project by Josh Madakor. He is an excellent resource for all things Cybersecurity. The link to the tutorial can be found here. For this project, Azure was used. The project consisted of creating a virtual machi...DiscussAzure
Securiosecurio.hashnode.dev·Jun 18, 2023Introduction to SIEM: A Tryhackme writeupsIntroduction A Security Information and Event Management (SIEM) system is an essential tool that gathers data from diverse endpoints and network devices throughout a network, centralizes the information, and conducts correlation analysis. This room a...Discuss·126 readsWriteupsSIEM
Maurice Clevelandeverythingcyber.hashnode.dev·May 25, 2023Exploring the Basics of CybersecurityIntroduction: In the realm of cybersecurity, Security Operations Center (SOC) analysts play a critical role in protecting organizations from cyber threats. In this blog, we will delve into two essential tools employed by SOC analysts: SIEM (Security ...DiscussSIEM