top of page



Mastering KQL: The Key to Enhancing Cybersecurity with Microsoft Sentinel
Delve into what KQL is, how it powers Microsoft Sentinel, and how cyber defenders can harness it to strengthen security postures with practical query example.
Jul 234 min read
Â
Â


Security Onion SIEM Setup
Security Onion SIEM setup guide.
Network security monitoring, intrusion detection, and log management
May 133 min read
Â
Â


Wazuh XDR setup on Proxmox virtual machine
This guide will show you how to setup a Wazuh on a home proxmox server and connect your Windows clients for security monitoring.
Apr 285 min read
Â
Â


Wazuh SIEM & XDR setup on Azure Linux virtual machine
This guide will show you how to setup a Wazuh server in Azure and connect your Windows clients for security monitoring within the Azure host
Jan 85 min read
Â
Â


Understanding DDoS Attacks: Methods, Tools, and Defense Strategies
Delve into how DDoS attacks are executed, tools hackers utilize, and the defensive measures companies can adopt to mitigate these threats.
Jul 31, 20244 min read
Â
Â


Security Analyst Tools
A Security Operations Center (SOC) analyst uses a variety of tools to monitor, detect, analyze, and respond to cybersecurity threats.
Jun 9, 20244 min read
Â
Â
bottom of page