Valente Security LabsLoad Balancing Splunk Search Head with HAProxyWhen we think in the two basic pillars of information security, we think not of the CIA triangle (confidentiality, integrity and…4 min read·Apr 11, 2024----
Valente Security LabsSplunk — Send data from forwarders to indexers using your own certificatesAttempting to intercept cross-platform traffic is one of the main techniques used by attackers to capture sensitive information. That’s…5 min read·Oct 17, 2022----
Valente Security LabsDetecting Viruses with ClamAV in your Linux MachineFor a long time, many system administrators believed that, Linux, the most widely used open-source operating system was safe and free from…5 min read·Dec 21, 2021----
Valente Security LabsAudit and Hardening Linux Machines with LynisOne of the important actions when it comes to endpoint security is having good hardening.5 min read·Nov 2, 2021----
Valente Security LabsProvisioning an AWS Infrastructure with AnsibleOne of the main advantages of cloud computing is the ability to provision a complete infrastructure using lines of code.8 min read·May 21, 2021----
Valente Security LabsAuthenticate your Servers in an Linux Active Directory [Part 10]5 min read·May 11, 2021----
Valente Security LabsMonitoring your Assets with Nagios [Part 9]Monitore the health of your environment is an important pillar of security. This is achieved through a pro-active IT monitoring to ensure…5 min read·May 11, 2021----
Valente Security LabsInstalling Cowrie Honeypot [Part 8]Basically, a honeypot is a computer system, with applications and data, where its objective is to trick cybercriminals into thinking that…4 min read·May 11, 2021----
Valente Security LabsInstalling Nessus e Vulnwhisperer [Part 7]Vulnerability management is the “cyclical practice of identifying, classifying, prioritizing, remediating, and mitigating” software…5 min read·May 2, 2021----
Valente Security LabsAutomatic Analysis with TheHive [Part 6]Now it’s time to watch everything working together.3 min read·May 2, 2021----