Blog Entries

25. 10. 2024 Tobias Goller Log-SIEM

Enhancing Cybersecurity with Elastic Defend: A Technical Consultant’s Perspective

In today’s digital landscape, cybersecurity is paramount. As a technical consultant, I’ve seen firsthand how organizations struggle to keep up with evolving threats. One tool that’s consistently stood out in the fight against cyber threats is Elastic Defend. In this blog post, I’ll delve into what Elastic Defend is, its key features, and how it…

Read More
16. 10. 2024 Alessandra Castiglioni Atlassian

Unlocking Jira’s Power: Mastering Issue Security and Permissions

Imagine you’re working on a project that involves sensitive company information. How can you ensure that only the right people can see and edit this data? Jira has the answer! In today’s fast-paced digital landscape, security remains a top priority for project management tools. In Jira, leveraging Issue Security Schemes alongside Permission Schemes ensures that…

Read More
15. 12. 2022 Rocco Pezzani NetEye

Strategies for Secret Management

In my previous blog post, we had a long discussion about how Icinga 2 manages its configuration in a Distributed Monitoring environment and how this can lead to unwanted disclosure of sensitive data, be it Secrets or Personal Data. The post ended with a set of recommendations/best practices that can be summarized in the statement…

Read More
30. 09. 2022 Rocco Pezzani NetEye

Secret Management with NetEye Monitoring

Today I want to talk about a topic that, although it is (and always has to be) in the spotlight, is seeing its popularity skyrocket even more in recent months: how to handle Secrets and Personal Data with NetEye. And I’m not talking about the right way to use Director’s Data Fields, how to hide…

Read More
12. 03. 2021 Massimo Giaimo Blue Team, Log-SIEM, SEC4U

Microsoft Exchange 0-Day: Let’s Look at the Facts!

I’m writing this article with the goal of summarizing the events of recent days concerning the zero-day vulnerability that has struck Microsoft Exchange installations, and to provide some useful information to help you understand how the attack began, how it developed, and what we should expect in the immediate future. First of all, a quick…

Read More
07. 02. 2019 MarinovMihail Log-SIEM, NetEye

Secure Connections for the Safed Agent

The Safed agent can be configured via https and send its collected logs to the log collector though a TLS connection. The latest released version – 1.9.1 – supports TLS 1.2 (at a minimum) and TLS 1.3. The first step is to upload the private key, the local certificate and the CA certificate to the…

Read More

Archive