Stellar Cyberstellarcyber.hashnode.dev·Dec 19, 2024SIEM Correlation Rules: Enhancing Your Threat DetectionLogs represent the real-time activities of every single corner of your enterprise. Each audit log contains the information of a user’s activity, parameters, resources, and timing, making them a veritable goldmine of data. Read Full ArticleSIEM
ConradWilliamcxnrvd.hashnode.dev·Dec 12, 2024Day 2 - Investigating Suspicious Activity with Elastic SIEMIn today's cybersecurity landscape, SIEM (Security Information and Event Management) systems play a critical role in detecting, investigating, and responding to threats. In this blog post, we will walk you through a detailed investigation using Elast...Advent of Cyber 2024SIEM
J3bitokjebitok.hashnode.dev·Dec 5, 2024The Advent of Cyber: Day 2: Log Analysis - One Man's False Positive is Another Man's Potpourri (TryHackMe)In this article, we’ll cover the Log Analysis—One Man's False Positive is Another Man's Potpourri writeup as the Day 2 challenge of the Advent of Cyber event challenge. It was interesting to navigate the platform and filter different events and logs ...elastic-security
Ze Coutoprotocol-udp.hashnode.dev·Nov 12, 2024Simple and Easy Elastic SIEM LabIn this guide, I'll show you how to set up a home lab for Elastic Stack Security Information and Event Management (SIEM) using the Elastic web portal and a Kali Linux virtual machine (VM). You'll also learn how to create security events on the Kali V...116 reads#cybersecurity
J3bitokjebitok.hashnode.dev·Nov 3, 2024Security Solutions: Introduction to SIEM (TryHackMe)In this article, I will write a write-up for Introduction to SIEM that covers Network Visibility through SIEM, Log Sources and Log Ingestion, Why SIEM, Analysing Logs and Alerts, and Lab Work. What does SIEM stand for? Security Information and Event...SIEM
alice eneyoaliyo.hashnode.dev·Sep 20, 2024How To Use a Siem tool in a real-life situationgoogle pics In this guide, I’ll walk you through the steps to set up a home lab for Elastic Stack Security Information and Event Management (SIEM) using AWS EC2 Ubuntu and Elastic Cloud. You’ll also learn how to generate security events, configure an...elasticcloud
HughJassManhughjassman.hashnode.dev·Sep 16, 2024My Understanding of How a SIEM WorksSIEM stands for Security Information and Event Management, which as the name implies collects security information and manages those event. The main purpose of a SIEM is to centralize logs which are the records of events, and make sense of the collec...1 likeSIEM
Tarun Saitarunsai.hashnode.dev·Sep 5, 2024Step By Step Guide to Deploying Elastic and Kibana on VULTR ClouFor day 2 we focused on understanding the benefits of using ELK stack. Elasticsearch is a database primarily used to store various types of logs, enabling users to search through the data. It utilizes a query language called ESQL and employs RESTful...cybersecurity-projects
Elias SantoroforCobra SecOpscobrasecops.com·Sep 3, 2024Streamlining GCP Audit Log Management with Centralized Logging for SIEM IntegrationManaging logs across multiple Google Cloud Platform (GCP) projects can be a daunting task, especially when it comes to ensuring security and efficiency. One effective strategy is to centralize audit logs from various projects into a single project, w...GCP
alice eneyoaliyo.hashnode.dev·Aug 29, 2024🌟 Day 9: Let's Talk Cybersecurity Tools! 🌟Hey there! As I journey through the Foundations of Cybersecurity course, I'm thrilled to share the exciting world of essential tools used to protect and monitor systems. Today, I had a blast exploring Security Information and Event Management (SIEM) ...10 likes#GoogleChronicle