Hasitha UpekshithaLevel Up Your L1 SOC Game: Essential Playbooks for Investigating Cyber ThreatsThe life of an L1 SOC analyst is anything but dull. You’re on the frontlines, constantly vigilant against a barrage of cyber threats…May 9May 9
Hasitha UpekshithaUnleashing the Power of Artificial Intelligence and Machine Learning in Security Operation Centers…In the ever-evolving landscape of cybersecurity, Security Operation Centers (SOCs) stand as the frontline defenders against a myriad of…Mar 2Mar 2
Hasitha UpekshithaEmbarking on the AI Journey: A Comprehensive Guide to Starting Your Learning PathIn the rapidly evolving landscape of technology, Artificial Intelligence (AI) stands out as a transformative force, influencing industries…Feb 28Feb 28
Hasitha UpekshithaCultivating Calm: Building a Powerful Morning Routine for SuccessWaking up to a blaring alarm and scrambling to get out the door can set the tone for a stressful and chaotic day. But what if you could…Feb 28Feb 28
Hasitha UpekshithaThe Rise of Phishing Attacks: How to Spot Them and Stay SafeIn the digital age, where the internet plays an integral role in our daily lives, the rise of cyber threats has become a pressing concern…Feb 28Feb 28
Hasitha UpekshithaNavigating the Path: A Comprehensive Guide on How to Become a SOC AnalystIn the ever-evolving landscape of cybersecurity, Security Operations Center (SOC) analysts play a crucial role in safeguarding…Feb 28Feb 28
Hasitha UpekshithaStreamlining Incident Response: Wazuh Integration with PagerDutyIn the fast-paced world of IT security, responding swiftly to incidents is critical for maintaining a robust cybersecurity posture…Feb 28Feb 28
Hasitha UpekshithaTitle: A Step-by-Step Guide to Integrating Wazuh with SentinelOne for Enhanced CybersecurityIn the relentless battle against cyber threats, the integration of robust cybersecurity tools has become paramount. One such potent…Feb 28Feb 28
Hasitha UpekshithaSimplifying Security Operations: Installing Wazuh, The Hive, Cortex, and MISP Using DockerIn the ever-evolving landscape of cybersecurity, deploying an integrated set of tools is crucial for effective threat detection, analysis…Feb 263Feb 263
Hasitha UpekshithaDocker and Docker compose InstallationInstalling Docker: 1. Update Package Repositories: Ensure your package repositories are up to date: #sudo apt updateFeb 26Feb 26