Valente Security LabsLoad Balancing Splunk Search Head with HAProxyWhen we think in the two basic pillars of information security, we think not of the CIA triangle (confidentiality, integrity and…Apr 11Apr 11
Valente Security LabsSplunk — Send data from forwarders to indexers using your own certificatesAttempting to intercept cross-platform traffic is one of the main techniques used by attackers to capture sensitive information. That’s…Oct 17, 2022Oct 17, 2022
Valente Security LabsDetecting Viruses with ClamAV in your Linux MachineFor a long time, many system administrators believed that, Linux, the most widely used open-source operating system was safe and free from…Dec 21, 2021Dec 21, 2021
Valente Security LabsAudit and Hardening Linux Machines with LynisOne of the important actions when it comes to endpoint security is having good hardening.Nov 2, 2021Nov 2, 2021
Valente Security LabsProvisioning an AWS Infrastructure with AnsibleOne of the main advantages of cloud computing is the ability to provision a complete infrastructure using lines of code.May 21, 2021May 21, 2021
Valente Security LabsAuthenticate your Servers in an Linux Active Directory [Part 10]May 11, 2021May 11, 2021
Valente Security LabsMonitoring your Assets with Nagios [Part 9]Monitore the health of your environment is an important pillar of security. This is achieved through a pro-active IT monitoring to ensure…May 11, 2021May 11, 2021
Valente Security LabsInstalling Cowrie Honeypot [Part 8]Basically, a honeypot is a computer system, with applications and data, where its objective is to trick cybercriminals into thinking that…May 11, 2021May 11, 2021
Valente Security LabsInstalling Nessus e Vulnwhisperer [Part 7]Vulnerability management is the “cyclical practice of identifying, classifying, prioritizing, remediating, and mitigating” software…May 2, 2021May 2, 2021
Valente Security LabsAutomatic Analysis with TheHive [Part 6]Now it’s time to watch everything working together.May 2, 2021May 2, 2021