InOSINT TeambyVISCIDAdvent of Cyber 2024: Day 2 — SOC Analysts Under PressureIf you don’t have medium membership, you can access the blog here: https://viscid.substack.com/p/advent-of-cyber-2024-day-2-soc-analysts3d ago
Logan ElkinsHome security stack part 3: Wazuh installationIts time to set up Wazuh. Wazuh will collect and log all of the data from our endpoints and alert on any suspicious activity as well as…Jun 1
Hilding KarlssonAdventures in Splunk NationSo, we got our first Splunk client running, what do we do? We raise hell to generate alerts. The components of this little experiment will…Nov 1Nov 1
InCoinsBenchbySrivatsa ChetlurWazuh Installation and Configuration: A Technical Deep DiveHello everyone! As an ardent explorer of the digital realm, I’m thrilled to share my latest insights on the fascinating convergence of…Sep 112Sep 112
Ali.mzfIntroducing A/B Testing in Security Rule Tuning: A UX-Inspired Approach to SOC OptimizationIn the ever-evolving world of cybersecurity, ensuring that security measures are effective without causing unnecessary noise is a…Sep 5Sep 5
InOSINT TeambyVISCIDAdvent of Cyber 2024: Day 2 — SOC Analysts Under PressureIf you don’t have medium membership, you can access the blog here: https://viscid.substack.com/p/advent-of-cyber-2024-day-2-soc-analysts3d ago
Logan ElkinsHome security stack part 3: Wazuh installationIts time to set up Wazuh. Wazuh will collect and log all of the data from our endpoints and alert on any suspicious activity as well as…Jun 1
Hilding KarlssonAdventures in Splunk NationSo, we got our first Splunk client running, what do we do? We raise hell to generate alerts. The components of this little experiment will…Nov 1
InCoinsBenchbySrivatsa ChetlurWazuh Installation and Configuration: A Technical Deep DiveHello everyone! As an ardent explorer of the digital realm, I’m thrilled to share my latest insights on the fascinating convergence of…Sep 112
Ali.mzfIntroducing A/B Testing in Security Rule Tuning: A UX-Inspired Approach to SOC OptimizationIn the ever-evolving world of cybersecurity, ensuring that security measures are effective without causing unnecessary noise is a…Sep 5
Nelson Chukwuemeka-AwujaBuilding Your SIEM: Install Kali Linux, Ubuntu Server, and Graylog Like a Pro.Follow our journey by practising with SIEM solutions by learning how to install Kali Linux, Ubuntu Server and Graylog for enhanced…Oct 23, 2023
Paul OkSetting up a Honeypot Virtual Machine and Analyzing the logs using Microsoft Sentinel for BeginnersAnalyzing of logs is one of the most important skills required for a beginner in Cybersecurity. The article is divided into 8 parts and…Jun 16, 2023