ze coutoprotocol-udp.hashnode.dev·Nov 12, 2024Simple and Easy Elastic SIEM LabIn this guide, I'll show you how to set up a home lab for Elastic Stack Security Information and Event Management (SIEM) using the Elastic web portal and a Kali Linux virtual machine (VM). You'll also learn how to create security events on the Kali V...Discuss·50 reads#cybersecurity
J3bitokjebitok.hashnode.dev·Nov 3, 2024Security Solutions: Introduction to SIEM (TryHackMe)In this article, I will write a write-up for Introduction to SIEM that covers Network Visibility through SIEM, Log Sources and Log Ingestion, Why SIEM, Analysing Logs and Alerts, and Lab Work. What does SIEM stand for? Security Information and Event...DiscussSIEM
alice eneyoaliyo.hashnode.dev·Sep 20, 2024How To Use a Siem tool in a real-life situationgoogle pics In this guide, I’ll walk you through the steps to set up a home lab for Elastic Stack Security Information and Event Management (SIEM) using AWS EC2 Ubuntu and Elastic Cloud. You’ll also learn how to generate security events, configure an...Discusselasticcloud
HughJassManhughjassman.hashnode.dev·Sep 16, 2024My Understanding of How a SIEM WorksSIEM stands for Security Information and Event Management, which as the name implies collects security information and manages those event. The main purpose of a SIEM is to centralize logs which are the records of events, and make sense of the collec...Discuss·1 likeSIEM
Tarun Saitarunsai.hashnode.dev·Sep 5, 2024Step By Step Guide to Deploying Elastic and Kibana on VULTR ClouFor day 2 we focused on understanding the benefits of using ELK stack. Elasticsearch is a database primarily used to store various types of logs, enabling users to search through the data. It utilizes a query language called ESQL and employs RESTful...Discusscybersecurity-projects
Elias SantoroforCobra SecOpscobrasecops.com·Sep 3, 2024Streamlining GCP Audit Log Management with Centralized Logging for SIEM IntegrationManaging logs across multiple Google Cloud Platform (GCP) projects can be a daunting task, especially when it comes to ensuring security and efficiency. One effective strategy is to centralize audit logs from various projects into a single project, w...DiscussGCP
alice eneyoaliyo.hashnode.dev·Aug 29, 2024🌟 Day 9: Let's Talk Cybersecurity Tools! 🌟Hey there! As I journey through the Foundations of Cybersecurity course, I'm thrilled to share the exciting world of essential tools used to protect and monitor systems. Today, I had a blast exploring Security Information and Event Management (SIEM) ...Discuss·10 likes#GoogleChronicle
FIKARA BILALblog.fikara.io·Aug 29, 2024Wazuh: InstallationWazuh est une plateforme open-source qui offre des moyens de détecter des menaces, de répondre aux incidents, de surveiller l'intégrité des fichiers et de fournir une visibilité sur l'ensemble de l'infrastructure. Wazuh est essentiellement un SIEM, u...Discuss·367 readsSecurity
Darshilciphersec.hashnode.dev·Aug 28, 2024In-Depth Guide to Setting Up and Using Shuffle: A Popular Open Source SOAR ToolShuffle is a highly regarded open source Security Orchestration, Automation, and Response (SOAR) tool known for its ease of deployment, robust features, and strong community support. This article will delve into the working of Shuffle, provide a step...Discuss·28 readsSIEM
Ewaldo Simon Hirasaldosimon.com·Aug 26, 2024About onboarding log to SIEMI was working on a task where a bunch of application logs needed to be onboarded and monitored for alerts. I've been thinking about the best way to share the experience from this job, and a full workflow would probably be more appropriate and useful ...Discuss·37 readslog onboard