Detection-as-Code for Wazuh 4.x: A Practical Implementation Model

Detection-as-Code for Wazuh 4.x: A Practical Implementation Model

>
August 5th 2025 / Ambassadors
By Zafer Balkan / Zafer Balkan Blog

If you are running Wazuh in your environment in your organization, either to protect your entity or others’ as a service provider, one of the primary operational challenges you would face is the “customization tax”1. You need to keep your detection rules up to date, working, and not conflicting with each other. You need to write your suppressions properly as well.

August 5th 2025 / Ambassadors

Detection-as-Code for Wazuh 4.x: A Practical Implementation Model

By Zafer Balkan / Zafer Balkan Blog

If you are running Wazuh in your environment in your organization, either to protect your entity or others’ as a service provider, one of the primary operational challenges you would face is the “customization tax”1. You need to keep your detection rules up to date, working, and not conflicting with each other. You need to write your suppressions properly as well.

Read more

>
The SIEM WAZUH & Why you should Care

The SIEM WAZUH & Why you should Care

>
August 4th 2025 / Ambassadors
By Dzidula Gati / Medium

Wazuh is an open-source SIEM solution with a wide range of capabilities, including, Malware Detection, Vulnerability Detection, Security Configuration Assessment (SCA), File Intergrity Monitoring (FIM) and many more.

August 4th 2025 / Ambassadors

The SIEM WAZUH & Why you should Care

By Dzidula Gati / Medium

Wazuh is an open-source SIEM solution with a wide range of capabilities, including, Malware Detection, Vulnerability Detection, Security Configuration Assessment (SCA), File Intergrity Monitoring (FIM) and many more.

Read more

>
Organize Your Wazuh SOC Workflow: GitHub Repository Setup for New Cybersecurity Analysts

Organize Your Wazuh SOC Workflow: GitHub Repository Setup for New Cybersecurity Analysts

>
July 30th 2025 / Ambassadors
By Enitan Ogungbade / Medium

This post is for anyone stepping into the world of Security Operations or trying to bring more order to their cybersecurity workflow. I’ll show you how to build a clean, practical GitHub repo tailored to the needs of a SOC Analyst. Whether you’re handling incidents, writing Sigma rules, working with Wazuh, or simply documenting processes, this setup will help you stay efficient and ready.

July 30th 2025 / Ambassadors

Organize Your Wazuh SOC Workflow: GitHub Repository Setup for New Cybersecurity Analysts

By Enitan Ogungbade / Medium

This post is for anyone stepping into the world of Security Operations or trying to bring more order to their cybersecurity workflow. I’ll show you how to build a clean, practical GitHub repo tailored to the needs of a SOC Analyst. Whether you’re handling incidents, writing Sigma rules, working with Wazuh, or simply documenting processes, this setup will help you stay efficient and ready.

Read more

>
Quick-Start Guide: Installing the All-in-One Wazuh Stack on Ubuntu 24.04.02

Quick-Start Guide: Installing the All-in-One Wazuh Stack on Ubuntu 24.04.02

>
July 24th 2025 / Ambassadors
By Ahmed Abbes / Medium

This guide provides step-by-step instructions to install the full Wazuh Stack (Wazuh indexer, Wazuh manager, and Wazuh dashboard) on a single Ubuntu 24.04 server.

July 24th 2025 / Ambassadors

Quick-Start Guide: Installing the All-in-One Wazuh Stack on Ubuntu 24.04.02

By Ahmed Abbes / Medium

This guide provides step-by-step instructions to install the full Wazuh Stack (Wazuh indexer, Wazuh manager, and Wazuh dashboard) on a single Ubuntu 24.04 server.

Read more

>
Why Choose Wazuh to Secure Your Critical Infrastructure in Francophone Africa?

Why Choose Wazuh to Secure Your Critical Infrastructure in Francophone Africa?

>
July 24th 2025 / Ambassadors
By Emmanuel Bama / idiaware

As Francophone African nations advance their digital transformation, securing critical infrastructure is a top priority.
Wazuh, an open-source SIEM/XDR platform, is gaining traction for its adaptable, cost-effective cybersecurity capabilities.
Its use cases align well with regional needs, offering strong protection for IT assets from Dakar to Kinshasa.

July 24th 2025 / Ambassadors

Why Choose Wazuh to Secure Your Critical Infrastructure in Francophone Africa?

By Emmanuel Bama / idiaware

As Francophone African nations advance their digital transformation, securing critical infrastructure is a top priority.
Wazuh, an open-source SIEM/XDR platform, is gaining traction for its adaptable, cost-effective cybersecurity capabilities.
Its use cases align well with regional needs, offering strong protection for IT assets from Dakar to Kinshasa.

Read more

>
Europe’s Quest for Digital Sovereignty: From Regulatory Ambition to Open-Source Reality

Europe’s Quest for Digital Sovereignty: From Regulatory Ambition to Open-Source Reality

>
July 23rd 2025 / Ambassadors
By Baptiste Leterrier / Ghost

This article examines the EU’s journey toward digital independence, analyzing past failures, current regulatory foundations, and the promising role of open-source solutions like Wazuh in achieving true technological autonomy.

July 23rd 2025 / Ambassadors

Europe’s Quest for Digital Sovereignty: From Regulatory Ambition to Open-Source Reality

By Baptiste Leterrier / Ghost

This article examines the EU’s journey toward digital independence, analyzing past failures, current regulatory foundations, and the promising role of open-source solutions like Wazuh in achieving true technological autonomy.

Read more

>
Data Loss Prevention mit Wazuh strategisch umsetzen

Data Loss Prevention mit Wazuh strategisch umsetzen

>
July 22nd 2025 / Ambassadors
By Stephan Wenderlich / Security Insider

Wazuh supports DLP strategies by offering modules like File Integrity Monitoring and Security Configuration Assessment.
While it can detect suspicious file or system changes, it doesn’t analyze content for data sensitivity.
Full DLP requires combining Wazuh with external tools and clear data classification policies.

July 22nd 2025 / Ambassadors

Data Loss Prevention mit Wazuh strategisch umsetzen

By Stephan Wenderlich / Security Insider

Wazuh supports DLP strategies by offering modules like File Integrity Monitoring and Security Configuration Assessment.
While it can detect suspicious file or system changes, it doesn’t analyze content for data sensitivity.
Full DLP requires combining Wazuh with external tools and clear data classification policies.

Read more

>