elastic data core components in cyber security

Elastic Data Core Components In Cybersecurity

June 24, 2022 Adeniyi Salau 0

  A typical network has a multitude of different logs to keep track of and most of those logs are in different formats. With huge amounts of disparate data, how is it possible to get an overview of network operations while also getting a sense of subtle anomalies or changes […]

Digital Forensics In Cybersecurity: Facts To Note

Digital Forensics In Cybersecurity: Facts To Note

June 24, 2022 Adeniyi Salau 0

Digital Forensics In Cybersecurity: Facts To Note   Now that you have investigated and identified valid alerts, what do you do with the evidence? The cybersecurity analyst will inevitably uncover evidence of criminal activity. In order to protect the organization and to prevent cybercrime, it is necessary to identify threat […]

Cyber Killer Chain In Cybersecurity: Facts To Know

Cyber Killer Chain In Cybersecurity: Facts To Know

June 24, 2022 Adeniyi Salau 0

  The Cyber Killer Chain was developed by Lockheed Martin to identify and prevent cyber intrusions. There are seven steps to the Cyber Kill Chain. Focusing on these steps helps analysts understand the techniques, tools, and procedures of threat actors.   When responding to a security incident, the objective is […]

Intrusion Analysis

Understanding Diamond Model Of Intrusion Analysis

June 24, 2022 Adeniyi Salau 0

Understanding Diamond Model Of Intrusion Analysis   The Diamond Model of Intrusion Analysis is made up of four parts, as shown in the figure. The model represents a security incident or event. In the Diamond Model, an event is a time-bound activity that is restricted to a specific step in […]

8 Expert Tips To Clear CEH Exam In First Attempt

8 Expert Tips To Clear CEH Exam In First Attempt

June 24, 2022 Adeniyi Salau 0

  With the Covid 19 pandemic ravaging the country, more and more businesses have had to shift online. While many businesses struggle to get their feet off the ground in the online sphere, organizations that help in IT training and obtaining ethical hacker certification have been around the block.   […]

Comprehensive Guide On Use Of SD-WAN

Comprehensive Guide On Use Of SD-WAN

February 8, 2021 Adeniyi Salau 1

In my previous article, I have discussed some of the facts that you need to know about Cloud Computing. In this article, I want to talk about what you need to know about the use of SD-WAN. Follow me as we are going to be looking at that in this […]

Comprehensive Guide About Cloud Computing

Comprehensive Guide About Cloud Computing

February 8, 2021 Adeniyi Salau 0

In my previous article, I have talked about all that you need to know about Cyber Attacks. In this article, I will be presenting a comprehensive guide about Cloud Computing. Follow me as we will look at this together in this article.      Only a few people understand what […]

Understanding Insider Threat In Network Security

Understanding Insider Threat In Network Security

February 8, 2021 Adeniyi Salau 0

  In my previous article, I have talked about a phishing attack in network security. In this article, I want to talk about all that you need to know about Insider Threats in Network Security. Follow me as we are going to look at this together in this article.    […]

cyber criminals

An Insight Into The Activity Of Cybercriminals

February 2, 2021 Adeniyi Salau 0

In my previous article, I have mentioned that cybercriminals are motivated by money and they want to do all that they could do steal your personal data, most especially your card information.   In this article, I want to highlight the major facts that you need to know about the […]