IT Security

March 4, 2024

Ingestion of Network Device Logs to an SIEM Syslog Server Through a Central Syslog Server

In this blog, we will work on monitoring network devices to detect anomalies and unwanted activity. We ingest network logs on a centralized syslog server and then connect it with our SIEM tool.
January 31, 2024

Using Graylog for Threat Detection, Visualization & Log Analysis in Wazuh

In an interconnected world, IT is more exposed than ever to a vast array of cyber threats. From malware to ransomware, phishing to DDoS attacks, organizations constantly grapple with identifying and responding to threats in real time.
January 6, 2024

Security Incident Response Using TheHive & Cortex – Part 2

TheHive is an open-source security incident response platform that provides a comprehensive solution for security analysts, threat hunters, and incident responders. Cortex allows security teams to automate their threat intelligence and response workflows
December 7, 2023

Security Incident Response Using TheHive & Cortex – Part 1

TheHive is an open-source security incident response platform that provides a comprehensive solution for security analysts, threat hunters, and incident responders. Cortex allows security teams to automate their threat intelligence and response workflows.
November 19, 2023

Registering Linux & Windows Servers with Wazuh and File Monitoring Using FIM Module

Wazuh is an open-source security information and event management (SIEM) tool. It provides security information, log management, vulnerability detection, intrusion detection, and much more.
October 12, 2023

Strengthening System Security with Ansible

While the Linux operating system offers inherent security advantages over Windows, it's crucial to recognize that even the most secure systems require continuous vigilance. In this blog, we shall explore about system hardening and how Ansible, a powerful automation tool, can revolutionize the way we protect our servers.
September 30, 2023

Managing Security and Compliance in Heterogeneous Linux Infrastructure, Anywhere – Part 2

In this second part of the blog post on managing security and compliance in a Linux infrastructure, we shall delve into the process of performing security patch audits on registered Client Systems using SUSE Manager (SUMA).
September 29, 2023

Managing Security and Compliance in Heterogeneous Linux Infrastructure, Anywhere – Part 1

Explore how to address security & compliance challenges using SUSE Manager and OpenSCAP. These two powerful solutions offer a unified framework to efficiently manage and safeguard your Linux ecosystem.