Comparing Popular SIEM Data Pipeline Designs: Elastic , ArcSight, QRadar, and Splunk — Part 3We will continue with what we discussed on Part 2. In this article we will provide breif analysis of the pipeline designs of Splunk . The…Sep 291Sep 291
Comparing Popular SIEM Data Pipeline Designs: Elastic , ArcSight, QRadar, and Splunk — Part 2We will continue with what we discussed on Part 1. In this article we will provide detailed analysis of the pipeline designs of f…Aug 3Aug 3
How to Set Up Your Own Local PyPi Repository Server for Python Package ManagementIf you found this article interesting, your support by following steps will help me spread the knowledge to others:Jul 13Jul 13
Comparing Popular SIEM Pipeline Designs: Elastic SIEM, ArcSight, QRadar, and Splunk — Part 1In this article we will provide comparative analysis of the pipeline designs of four popular SIEM solutions: Elastic SIEM, ArcSight…Jul 13Jul 13
Streamlining Cyber Incident Response: Deploying TheHive with Docker SimplifiedTheHive Deployment with Docker: A Step-by-Step GuideJul 41Jul 41
Published inCoinmonksDigitizing Ancient Ge’ez Manuscripts: A Step by Step Guide Using Tesseract OCR and LabelmeIf you found this article interesting, your support by following steps will help me spread the knowledge to others:Jun 22Jun 22
Securing Elasticsearch: Implementing External CA-Signed SSL Certificates with Elasticsearch ClusterA Comprehensive Guide to Configuring Elasticsearch Cluster and Kibana with Enhanced Security for 3 nodes clusterJan 31Jan 31
Convert SYSLOG Events to CEF formatStep by step guide to convert SYSLOG log format to CEF format using pythonJun 20, 2023Jun 20, 2023