Newsroom

Leveraging AI/ML for next-gen SOC environments

Leveraging AI/ML for next-gen SOC environments

>
October 14th 2024 / The Register
By The Register

This article discusses some of the challenges traditional SOCs face and how integrating artificial intelligence/machine learning (AI/ML) modules could help solve the challenges faced by security professionals and organizations…

October 14th 2024 / The Register

Leveraging AI/ML for next-gen SOC environments

By The Register

This article discusses some of the challenges traditional SOCs face and how integrating artificial intelligence/machine learning (AI/ML) modules could help solve the challenges faced by security professionals and organizations…

Read more

>
How open source SIEM and XDR tackle evolving threats

How open source SIEM and XDR tackle evolving threats

>
October 9th 2024 / Bleeping Computer
By Bleeping Computer

In today’s cybersecurity landscape, evolving threats require security solutions that match the sophistication of modern threats. As businesses rapidly adopt emerging technologies, their exposure to cyberattacks increases. To mitigate…

October 9th 2024 / Bleeping Computer

How open source SIEM and XDR tackle evolving threats

By Bleeping Computer

In today’s cybersecurity landscape, evolving threats require security solutions that match the sophistication of modern threats. As businesses rapidly adopt emerging technologies, their exposure to cyberattacks increases. To mitigate…

Read more

>
Part 2: Wazuh Agents addition

Part 2: Wazuh Agents addition

>
September 21st 2024 / Medium
By Sunday Oluwagbemileke Akinbobola

Deploying Wazuh agents on endpoints provides comprehensive visibility into security events, enabling real-time threat detection, enhanced endpoint protection, and distributed monitoring across a network. These agents gather…

September 21st 2024 / Medium

Part 2: Wazuh Agents addition

By Sunday Oluwagbemileke Akinbobola

Deploying Wazuh agents on endpoints provides comprehensive visibility into security events, enabling real-time threat detection, enhanced endpoint protection, and distributed monitoring across a network. These agents gather…

Read more

>
Implementing XDR & SIEM with Wazuh on VMware Workstation

Implementing XDR & SIEM with Wazuh on VMware Workstation

>
September 19th 2024 / Medium
By Kelvin JKGY

Security Information and Event Management (SIEM) is a system that collects, and analyses security data from several sources within an organisation’s IT infrastructure. SIEM solutions provide near real-time information on security…

September 19th 2024 / Medium

Implementing XDR & SIEM with Wazuh on VMware Workstation

By Kelvin JKGY

Security Information and Event Management (SIEM) is a system that collects, and analyses security data from several sources within an organisation’s IT infrastructure. SIEM solutions provide near real-time information on security…

Read more

>
Ensuring HIPAA compliance with Wazuh

Ensuring HIPAA compliance with Wazuh

>
September 17th 2024 / Analytics Insight
By Analytics Insight

The Health Insurance Portability and Accountability Act, HIPAA, is a compliance standard that regulates the lawful use and disclosure of protected health information. Its primary purpose is to ensure that individuals’ medical information…

September 17th 2024 / Analytics Insight

Ensuring HIPAA compliance with Wazuh

By Analytics Insight

The Health Insurance Portability and Accountability Act, HIPAA, is a compliance standard that regulates the lawful use and disclosure of protected health information. Its primary purpose is to ensure that individuals’ medical information…

Read more

>
Exploring Vulnerability Management with Wazuh

Exploring Vulnerability Management with Wazuh

>
September 10th 2024 / The Science Times
By Eryka S.

Given the continuous increase in registered vulnerabilities year-over-year and the risks posed by the availability of public exploits, vulnerability management remains a key component of an organization’s security strategy…

September 10th 2024 / The Science Times

Exploring Vulnerability Management with Wazuh

By Eryka S.

Given the continuous increase in registered vulnerabilities year-over-year and the risks posed by the availability of public exploits, vulnerability management remains a key component of an organization’s security strategy…

Read more

>
Enhancing Security with Wazuh and CriminalIP Integration

Enhancing Security with Wazuh and CriminalIP Integration

>
September 8th 2024 / Medium
By Shahid Akhter

As cyber threats become increasingly sophisticated, integrating powerful tools for security monitoring and threat intelligence is critical. In this blog post, I will guide you through integrating Wazuh — an open-source security monitoring platform — with…

September 8th 2024 / Medium

Enhancing Security with Wazuh and CriminalIP Integration

By Shahid Akhter

As cyber threats become increasingly sophisticated, integrating powerful tools for security monitoring and threat intelligence is critical. In this blog post, I will guide you through integrating Wazuh — an open-source security monitoring platform — with…

Read more

>