The Importance of IAM, Logging, and Monitoring in AWS
You’re probably familiar with the adage, “On the internet, nobody knows you’re a dog.” The premise is simple. If nobody can actually see you, then you can be whoever you claim to be when you’re on the internet. That’s why identity and access management is crucial to the integrity of ...
Continue ReadingReady, Set, Secure Episode 15
Click here to listen! On this episode Michael and Nick chat with Corey Bodzin, CTO of deepwatch, about all of the latest developments with the deepwatch team including their newest tool, Lens Score, and how essential SecOps maturity is to any organization. Things Mentioned: ...
Continue ReadingGraphing Modem Data for Fun: Part 4
Welcome to part 4 of the series. In the previous posts I have built a dashboard to show the status of my cable modem using different log analytics tools. In this post I will be using Humio to build the dashboard. Humio is a relative newcomer to the log analytics space. A quick scan of the ...
Continue ReadingReady, Set, Secure Episode 14
Click Here to listen to the latest episode! This week Michael and Nick sit down with one of Set Solutions Cybersecurity experts – Senior Security Solutions Architect Chandresh Patel – to discuss his upcoming series on vulnerability management. Things Mentioned: ...
Continue ReadingGraphing Modem Data for Fun: Part 3
I have been playing around with Elasticsearch and Kibana for a little while now. I have installed them and run through a couple of demos. Like cooking with a recipe, things usually work out when you are following instructions. The problem is that I do not have good use case to help me explore how ...
Continue Reading