alice eneyoaliyo.hashnode.dev·Sep 20, 2024How To Use a Siem tool in a real-life situationgoogle pics In this guide, I’ll walk you through the steps to set up a home lab for Elastic Stack Security Information and Event Management (SIEM) using AWS EC2 Ubuntu and Elastic Cloud. You’ll also learn how to generate security events, configure an...Discusselasticcloud
HughJassManhughjassman.hashnode.dev·Sep 16, 2024My Understanding of How a SIEM WorksSIEM stands for Security Information and Event Management, which as the name implies collects security information and manages those event. The main purpose of a SIEM is to centralize logs which are the records of events, and make sense of the collec...Discuss·1 likeSIEM
Tarun Saitarunsai.hashnode.dev·Sep 5, 2024Step By Step Guide to Deploying Elastic and Kibana on VULTR ClouFor day 2 we focused on understanding the benefits of using ELK stack. Elasticsearch is a database primarily used to store various types of logs, enabling users to search through the data. It utilizes a query language called ESQL and employs RESTful...Discusscybersecurity-projects
Elias SantoroforCobra SecOpscobrasecops.com·Sep 3, 2024Streamlining GCP Audit Log Management with Centralized Logging for SIEM IntegrationManaging logs across multiple Google Cloud Platform (GCP) projects can be a daunting task, especially when it comes to ensuring security and efficiency. One effective strategy is to centralize audit logs from various projects into a single project, w...DiscussGCP
alice eneyoaliyo.hashnode.dev·Aug 29, 2024🌟 Day 9: Let's Talk Cybersecurity Tools! 🌟Hey there! As I journey through the Foundations of Cybersecurity course, I'm thrilled to share the exciting world of essential tools used to protect and monitor systems. Today, I had a blast exploring Security Information and Event Management (SIEM) ...Discuss·10 likes#GoogleChronicle
FIKARA BILALblog.fikara.io·Aug 29, 2024Wazuh: InstallationWazuh est une plateforme open-source qui offre des moyens de détecter des menaces, de répondre aux incidents, de surveiller l'intégrité des fichiers et de fournir une visibilité sur l'ensemble de l'infrastructure. Wazuh est essentiellement un SIEM, u...Discuss·159 readsSecurity
Darshilciphersec.hashnode.dev·Aug 28, 2024In-Depth Guide to Setting Up and Using Shuffle: A Popular Open Source SOAR ToolShuffle is a highly regarded open source Security Orchestration, Automation, and Response (SOAR) tool known for its ease of deployment, robust features, and strong community support. This article will delve into the working of Shuffle, provide a step...DiscussSIEM
Ewaldo Simon Hirasaldosimon.com·Aug 26, 2024About onboarding log to SIEMI was working on a task where a bunch of application logs needed to be onboarded and monitored for alerts. I've been thinking about the best way to share the experience from this job, and a full workflow would probably be more appropriate and useful ...Discusslog onboard
Abhiramcloudbuddy.hashnode.dev·Aug 19, 2024CSPM and Artificial Intelligence: A Powerful CombinationCloud Security Posture Management (CSPM) is a critical component of cloud security, providing organizations with visibility into their cloud environments, identifying vulnerabilities, and ensuring compliance with security best practices. However, tra...DiscussAI Platform Cloud Service Market
Esha Adhawadeesha14.hashnode.dev·Aug 12, 2024Understanding the Differences of SIEM and SOARSecurity Information and Event Management (SIEM) and Security Orchestration, Automation, and Response (SOAR) have become significant systems in modern cybersecurity. In this blog, we will discuss the intricacies of SIEM & SOAR, and explore their diff...DiscussCybersecuritySIEM