
Security Analytics Using ELK
Few months back, I had the opportunity to conduct two workshops at BSidesDelhi and CSI Mumbai on the above topic. […]
Few months back, I had the opportunity to conduct two workshops at BSidesDelhi and CSI Mumbai on the above topic. […]
ELK Stack is a collection of three components – Elasticsearch, Logstash & Kibana Logstash – This component is responsible […]
An important aspect of effective threat hunting is to understand what is normal in an environment. If a threat hunter […]
Before we start to configure our decoys and put it in our production environment, let’s take a look at what […]
Most organizations face a barrage of attacks every day from threat actors around the globe. Among the various vectors, attackers […]
If you are looking to navigate your way through the complexities of Big Data and its use in Security, here […]