Newsroom

How Wazuh Can Help Organizations Better Manage Their Security Posture

How Wazuh Can Help Organizations Better Manage Their Security Posture

>
January 8th 2025 / Medium
By Licio Lentimo

Cybersecurity threats are constantly on the rise and do not seem to be going anywhere anytime soon. The damage they cause to the affected organizations only speaks to the fact that they need to strengthen their defenses against…

January 8th 2025 / Medium

How Wazuh Can Help Organizations Better Manage Their Security Posture

By Licio Lentimo

Cybersecurity threats are constantly on the rise and do not seem to be going anywhere anytime soon. The damage they cause to the affected organizations only speaks to the fact that they need to strengthen their defenses against…

Read more

>
Integrating Wazuh with Cloud Environments: AWS, Azure, and GCP

Integrating Wazuh with Cloud Environments: AWS, Azure, and GCP

>
January 7th 2025 / Medium
By Varul Arora

With the increasing trend of organisations adopting multi-cloud strategy, it is vital that security tools are able to scale and monitor the different environments such as AWS, Azure, or GCP. Wazuh is an open-source cloud SIEM platform that integrates both XDR…

January 7th 2025 / Medium

Integrating Wazuh with Cloud Environments: AWS, Azure, and GCP

By Varul Arora

With the increasing trend of organisations adopting multi-cloud strategy, it is vital that security tools are able to scale and monitor the different environments such as AWS, Azure, or GCP. Wazuh is an open-source cloud SIEM platform that integrates both XDR…

Read more

>
Leveraging Wazuh for a Secure Remote Work Environment

Leveraging Wazuh for a Secure Remote Work Environment

>
December 16th 2024 / Tech Times
By Carl Williams

Securing remote work environments has become a concern for businesses as the demand for flexibility and improved work-life balance drives its adoption. Most of the time, remote teams require access to the same internal services…

December 16th 2024 / Tech Times

Leveraging Wazuh for a Secure Remote Work Environment

By Carl Williams

Securing remote work environments has become a concern for businesses as the demand for flexibility and improved work-life balance drives its adoption. Most of the time, remote teams require access to the same internal services…

Read more

>
Wazuh Series: Wazuh set up for threat detection, proactive monitoring, and malware analysis

Wazuh Series: Wazuh set up for threat detection, proactive monitoring, and malware analysis

>
December 13th 2024 / Medium
By Chinaza Emmanuela Obidike

In today’s cybersecurity landscape, the need for robust threat detection, proactive monitoring, and malware analysis cannot be overstated. Wazuh, an open-source security platform, offers a comprehensive suite of tools to monitor, detect…

December 13th 2024 / Medium

Wazuh Series: Wazuh set up for threat detection, proactive monitoring, and malware analysis

By Chinaza Emmanuela Obidike

In today’s cybersecurity landscape, the need for robust threat detection, proactive monitoring, and malware analysis cannot be overstated. Wazuh, an open-source security platform, offers a comprehensive suite of tools to monitor, detect…

Read more

>
Detect APT Group with Wazuh Part Two | APT UNC4841

Detect APT Group with Wazuh Part Two | APT UNC4841

>
December 9th 2024 / Medium
By Vikas Chauhan

In a striking example of how sophisticated APT groups exploit vulnerabilities in widely used systems, the Barracuda Email Security Gateway (ESG) has been globally exploited, exposing businesses to critical cybersecurity…

December 9th 2024 / Medium

Detect APT Group with Wazuh Part Two | APT UNC4841

By Vikas Chauhan

In a striking example of how sophisticated APT groups exploit vulnerabilities in widely used systems, the Barracuda Email Security Gateway (ESG) has been globally exploited, exposing businesses to critical cybersecurity…

Read more

>
Introduction to Wazuh

Introduction to Wazuh

>
October 17th 2024 / Medium
By Benmansour Nejib

This post is the part one of the series “Wazuh From zero to hero”. In this post we will give a brief introduction to Wazuh and we will talk about Wazuh Components, Wazuh modules, Wazuh integrations…

October 17th 2024 / Medium

Introduction to Wazuh

By Benmansour Nejib

This post is the part one of the series “Wazuh From zero to hero”. In this post we will give a brief introduction to Wazuh and we will talk about Wazuh Components, Wazuh modules, Wazuh integrations…

Read more

>
Leveraging AI/ML for next-gen SOC environments

Leveraging AI/ML for next-gen SOC environments

>
October 14th 2024 / The Register
By The Register

This article discusses some of the challenges traditional SOCs face and how integrating artificial intelligence/machine learning (AI/ML) modules could help solve the challenges faced by security professionals and organizations…

October 14th 2024 / The Register

Leveraging AI/ML for next-gen SOC environments

By The Register

This article discusses some of the challenges traditional SOCs face and how integrating artificial intelligence/machine learning (AI/ML) modules could help solve the challenges faced by security professionals and organizations…

Read more

>