Scenario: Detecting Insider Threats in AWS: A Real-World Example Using CloudTrail, GuardDuty, and…Here’s a hypothetical example of an insider threat attack in an AWS environment, showcasing how various AWS logging tools are utilized to…Nov 6Nov 6
Comprehensive Guide to Monitoring AWS with Logs: Key Strategies for 2024In an increasingly complex cloud environment, effective monitoring in AWS is crucial to secure data, maintain performance, and adhere to…Nov 6Nov 6
Protecting Sensitive Data in the Digital Age: A Case Study in Cybersecurity FreelancingIn today’s digital landscape, information travels fast — too fast for comfort when it involves sensitive business data. Recently, I took…Oct 26Oct 26
Security Monitoring Freelancing Project: Security Log Monitoring with ELK Stack for GCC Engineering…Last quarter, I have completed a cybersecurity freelancing project for a customer in the GCC region operating in the engineering…Oct 26Oct 26
Detecting Ransomware using Kibana queriesHere are some common ransomware activities and example Kibana queries to detect them in Windows logs:Apr 14, 2023Apr 14, 2023