What to Do After a Cybersecurity Breach: A Step-by-Step GuideCybersecurity breaches are a nightmare for businesses, especially for small and medium enterprises (SMEs) that often lack the resources for…Nov 26, 2024Nov 26, 2024
Scenario: Detecting Insider Threats in AWS: A Real-World Example Using CloudTrail, GuardDuty, and…Here’s a hypothetical example of an insider threat attack in an AWS environment, showcasing how various AWS logging tools are utilized to…Nov 6, 2024Nov 6, 2024
Comprehensive Guide to Monitoring AWS with Logs: Key Strategies for 2024In an increasingly complex cloud environment, effective monitoring in AWS is crucial to secure data, maintain performance, and adhere to…Nov 6, 2024Nov 6, 2024
Protecting Sensitive Data in the Digital Age: A Case Study in Cybersecurity FreelancingIn today’s digital landscape, information travels fast — too fast for comfort when it involves sensitive business data. Recently, I took…Oct 26, 2024Oct 26, 2024
Security Monitoring Freelancing Project: Security Log Monitoring with ELK Stack for GCC Engineering…Last quarter, I have completed a cybersecurity freelancing project for a customer in the GCC region operating in the engineering…Oct 26, 2024Oct 26, 2024
Dark Web Data Leak: A Real-World Investigation and Remediation ApproachIntroductionOct 25, 2024Oct 25, 2024
Detecting Ransomware using Kibana queriesHere are some common ransomware activities and example Kibana queries to detect them in Windows logs:Apr 14, 2023Apr 14, 2023