Abhiramcloudbuddy.hashnode.dev·Jul 12, 2024From Chaos to Cosmos: How Generative AI Can Automate Threat Detection in the CloudThe cloud has become the lifeblood of modern businesses. From housing mission-critical applications to storing sensitive data, organizations are increasingly reliant on cloud infrastructure. But with this convenience comes a growing challenge: securi...DiscussThreatDetection
Jiyajiyajha.hashnode.dev·Jun 6, 2024Big Data, Big Threats: Understanding the Urgency of Data SecurityThe term big data security refers to the collection of safeguards and instruments used to protect analytics and data from theft, attacks, and other malicious activity that could harm or negatively impact them. Big Data deployments are attractive targ...Discussbigdatasecurity
Raicode.flatmarstheory.com·Jun 1, 2024AI-Powered Threat DetectionIn today's digital age, cybersecurity is facing unprecedented challenges. The rise of advanced persistent threats (APTs), sophisticated cyber attacks, and the sheer volume of data generated by interconnected devices (IoT) demand innovative solutions....Discusscybersecurity
Sumit Mondalsumit007.hashnode.dev·May 18, 2024Understanding AWS Security Lake: A Comprehensive Guide with Hands-On ExampleIntroduction to AWS Security Lake AWS Security Lake is a robust service designed to centralize security data from diverse sources into a dedicated data lake, making it easier for organizations to manage, analyze, and derive insights from their securi...DiscussAWS - HandsOnAWS
Jiyajiyajha.hashnode.dev·Mar 28, 2024Fortifying Our Foundations: Charting the Path in Critical Infrastructure ProtectionThe process of preventing, reducing, or fixing the risks of vulnerabilities in critical infrastructure assets is known as critical infrastructure protection or CIP.Critical infrastructure is shielded by CIP from terrorist threats, natural disasters, ...Discuss #CriticalInfrastructureProtection
Niranjan Gblog.securityinsights.io·Feb 11, 2024Protect Your AWS Accounts: Intelligent Threat Detection with GuardDutyUnveiling the Shield: GuardDuty for Enhanced AWS Security In the ever-evolving landscape of cloud security, threats lurk around every corner. But fear not, for Amazon Web Services (AWS) offers a powerful tool to combat them: GuardDuty. This intellig...Discussaws guardduty
Sumit Mondalsumit007.hashnode.dev·Feb 10, 2024Unlocking Security with Amazon GuardDuty: A Beginner's GuideIntroduction: In the ever-evolving landscape of cloud computing, ensuring the security of your AWS (Amazon Web Services) environment is paramount. With the rise of cyber threats, having a robust security strategy is crucial. Amazon GuardDuty, a manag...DiscussAWS - HandsOnAWS
Adrianajcyb3r.com·Feb 6, 2024Journey through Cybersecurity: Malware based on system components?I have no idea why, but sometimes acronyms in English are so interesting to me that they draw me deeper... In the previous post, I summarized my Windows Security review, mainly focusing on learning and reviewing PowerShell... and a few others. In the...Discuss#cybersecurity
Goodycybgoodycyb.hashnode.dev·Feb 4, 2024Threat detection🕵️♂️ in AWS using Amazon Athena ServiceI recommend starting with the article below before beginning the Hands-on lab.😉🕵️♂️ https://medium.com/@goodycyb/threat-detection-in-aws-using-amazon-athena-to-analyze-cloudtrail-logs-from-flaws-cloud-00a43348d18a Objective In this lab, you wil...Discuss·226 readsThreat Detection 💡🕵️♂️🕸️ThreatDetection
Aljoscha Irmeraljoschairmer.hashnode.dev·Jan 16, 2024Deciphering the Hidden: The Role of AI in Unmasking Obfuscated MalwareIntroduction In the evolving landscape of cybersecurity, the threat of malware and viruses persists as a significant challenge. These malicious entities often employ obfuscated code - a method designed to mask their true purpose and make analysis dif...DiscussObfuscated Code