Siddique Reza KhanDeploying T-Pot Honeypot in Azure Cloud: Enhancing Cybersecurity MeasuresDeployed T-Pot honeypot on Azure Cloud, monitored and analyzed honeypot data using Kibana, demonstrating expertise in Linux, cloud…Feb 8Feb 8
Siddique Reza KhanEnhancing Cybersecurity through Comprehensive Vulnerability Assessment and Remediation StrategiesNavigating the Cybersecurity Landscape: A Practical Journey in Vulnerability Assessment and Remediation Strategies on Windows Systems with…Feb 1Feb 1
Siddique Reza KhanFortifying Healthcare: A Comprehensive Security Framework for Hospital Information SystemsImplementing a robust security framework, this paper addresses the evolving threats in healthcare by fortifying Hospital Information…Jan 23Jan 23
Siddique Reza KhanUmbrella: A Comprehensive TryHackMe WalkthroughA Stealthy Journey through the Umbrella Corp’s Time-Tracking Server — TryHackMe WalkthroughJan 21Jan 21
Siddique Reza KhanWalkthrough: Covfefe — Beginner CTF on VulnhubExplanation of Buffer OverflowJan 20Jan 20
Siddique Reza KhanWalkthrough for Vulnhub Machine “billu:b0x”Let’s break down the walkthrough step by step:Jan 20Jan 20
Siddique Reza KhanEnhancing Cybersecurity Maturity: A Comprehensive GRC Analysis and NIST CSF Implementation at…Use Case: At GoodCorp, the Cyber Risk & Maturity Assessment serves as a vital tool in evaluating and enhancing the organization’s…Jan 14Jan 14
Siddique Reza KhanEmpowering Security Operations: Orchestrating Threat Detection and Response EfficienciesInexpensive Home Lab Building Continuation Part — 2Jan 11Jan 11
Siddique Reza KhanSetting Up Splunk SIEM: Utilizing Pre-Collected Logs and Extending Functionality with Add-On…Uncover the Power of Splunk: Elevate Your Security Story with Seamless SIEM Solutions.Jan 10Jan 10
Siddique Reza KhanBuilding an Automated SOC Ecosystem: A Seamless Workflow for Threat Detection and ResponseInexpensive Home Lab BuildingDec 27, 2023Dec 27, 2023