Splunk ES vs. Elastic (ELK) Stack: Comparison from the SOC Analyst

Splunk ES vs. Elastic (ELK) Stack: Comparison from the SOC Analyst

Splunk ES vs. Elastic (ELK) Stack: Comparison from the SOC Analyst by Iryna Yamborska 1. What are Splunk ES and Elastic (ELK) Stack? 2. Main Differences Between Splunk ES and Elastic (ELK) Stack 3. Summary Comparison 4. Conclusion The modern digital and globalized...
Log4Shell: How to Mitigate Log4j Vulnerability

Log4Shell: How to Mitigate Log4j Vulnerability

Log4Shell: How to Mitigate Log4j Vulnerability (CVE-2021-44228, CVE-2021-45046, CVE-2021-4104) by Iryna Yamborska 1. What is Log4Shell? 2. What makes Log4j uniquely dangerous even though you seem protected 3. Which Version is not affected? 4. How to Mitigate the...
Average Penetration Testing Cost. The Real Value of Security Test

Average Penetration Testing Cost. The Real Value of Security Test

Average Penetration Testing Cost. The Real Value of Security Test 1. Do I Really Need Penetration Testing? 2. Why, When, and How Often to Perform a Penetration Test? 3. What is Penetration Testing? 4. Which Type of Penetration Test Should I Choose? 5. How Much Does...
Cybersecurity as the new foundation for safe driving

Cybersecurity as the new foundation for safe driving

Cybersecurity as the new foundation for safe driving By Iryna Yamborska Human nature possesses both an aspiration to create and an aspiration to destroy. Therefore, when inventing something new, the creator must be prepared for someone who will want to exploit their...
In a flurry of supply chain cyber attacks

In a flurry of supply chain cyber attacks

In a flurry of supply chain cyber attacks  By Oksana Pervenonok Supply-chain cyber attacks have become hacker’s most favorite target. Given the domino effect that a cybersecurity breach might trigger—even if just one link of the supply chain is weakened—the outcomes...