InDetect FYIbyTruls TDSecurity Monitoring — Threat Modeling and Data SourcesOne of the most misunderstood aspects of security monitoring is determining what data sources to use for what purpose. In this post, we…Oct 142
WayneReidUKThe 5 things I did to improve the UK government’s active security monitoring.So I don’t expose any UK government departments I have created a fictious UK government agency. I refer to them as DISA.Nov 11Nov 11
Pepijn VissersUsing Wazuh on a Synology NAS to monitor external VPSes? Yes we can!Wazuh (the Open Source Security Platform) is a free product for security monitoring my VPS. It runs on Synology in Docker.Jul 21Jul 21
DavidevnCoWhat is Continuous Monitoring in DevOps and Why You Need It?Discover how continuous monitoring ensures the health, performance, and security of your applications in DevOps.Oct 7Oct 7
InDetect FYIbyTruls TDSecurity Monitoring — Threat Modeling and Data SourcesOne of the most misunderstood aspects of security monitoring is determining what data sources to use for what purpose. In this post, we…Oct 142
WayneReidUKThe 5 things I did to improve the UK government’s active security monitoring.So I don’t expose any UK government departments I have created a fictious UK government agency. I refer to them as DISA.Nov 11
Pepijn VissersUsing Wazuh on a Synology NAS to monitor external VPSes? Yes we can!Wazuh (the Open Source Security Platform) is a free product for security monitoring my VPS. It runs on Synology in Docker.Jul 21
DavidevnCoWhat is Continuous Monitoring in DevOps and Why You Need It?Discover how continuous monitoring ensures the health, performance, and security of your applications in DevOps.Oct 7
Rebman K.Lab #3: Blocking SSH Brute-force Attacks with Active Response in WazuhHello and welcome back!! In the previous Lab, we looked at detecting brute force attacks using Wazuh. This post will discuss blocking…Feb 1
InAardvark InfinitybyAardvark InfinityOwlDescription: A powerful Python script for advanced log analysis and anomaly detection. Owl reads through various log files, identifies…Sep 28