Ibrahim AyadhiCase managementIn today’s article we’ll be putting the last piece of the puzzle in its place. We are going to present to you the case management part of…Apr 21, 20202Apr 21, 20202
Ibrahim AyadhiReportingTo mitigate your enterprise network from threats and attacks, you should always perform vulnerabilities’ test on your system. In order, to…Apr 18, 20202Apr 18, 20202
Ibrahim AyadhiHello and welcome to our new article which will be covering the alerting part in our SOCaaS…I encourage you all to check the previous article to have a better understanding of what we are going to discuss here.Apr 16, 20203Apr 16, 20203
Ibrahim AyadhiWelcome to our fourth article of this series.Moving along in our project now that we have completed the SIEM part. It is the time to transform our solution from a simple observer to…Apr 14, 2020Apr 14, 2020
Ibrahim AyadhiVisualizing Dashboards and ELK SIEMWelcome to our second article of this series. I encourage you all to check the previous article to have a better understanding of what we…Apr 13, 2020Apr 13, 2020
Ibrahim AyadhiELK stack: Installation and shipping dataWelcome to our second article of this series. I encourage you all to check the previous article to have a better understanding of what we…Apr 11, 2020Apr 11, 2020
Ibrahim AyadhiDeploying of infrastructure and technologies for a SOC as a Service ( SOCasS)In the last couple of years, the number of cyberattacks have gone throw the roof. These attacks not only target single individuals but…Apr 10, 20206Apr 10, 20206