Load Balancing Splunk Search Head with HAProxyWhen we think in the two basic pillars of information security, we think not of the CIA triangle (confidentiality, integrity and…Apr 11Apr 11
Splunk — Send data from forwarders to indexers using your own certificatesAttempting to intercept cross-platform traffic is one of the main techniques used by attackers to capture sensitive information. That’s…Oct 17, 2022Oct 17, 2022
Detecting Viruses with ClamAV in your Linux MachineFor a long time, many system administrators believed that, Linux, the most widely used open-source operating system was safe and free from…Dec 21, 2021Dec 21, 2021
Audit and Hardening Linux Machines with LynisOne of the important actions when it comes to endpoint security is having good hardening.Nov 2, 2021Nov 2, 2021
Provisioning an AWS Infrastructure with AnsibleOne of the main advantages of cloud computing is the ability to provision a complete infrastructure using lines of code.May 21, 2021May 21, 2021
Monitoring your Assets with Nagios [Part 9]Monitore the health of your environment is an important pillar of security. This is achieved through a pro-active IT monitoring to ensure…May 11, 2021May 11, 2021
Installing Cowrie Honeypot [Part 8]Basically, a honeypot is a computer system, with applications and data, where its objective is to trick cybercriminals into thinking that…May 11, 2021May 11, 2021
Installing Nessus e Vulnwhisperer [Part 7]Vulnerability management is the “cyclical practice of identifying, classifying, prioritizing, remediating, and mitigating” software…May 2, 2021May 2, 2021
Automatic Analysis with TheHive [Part 6]Now it’s time to watch everything working together.May 2, 2021May 2, 2021