Linux Kernel Monitoring with Wazuh

Linux Kernel Monitoring with Wazuh

December 19th 2025 / Ambassadors
By Marco Teixeira / Medium

This document presents a comprehensive security architecture centered on the Linux kernel, utilizing Wazuh as the primary SIEM/XDR platform.

Read more
Integrating Amazon GuardDuty with Wazuh for Enhanced Cloud Security

Integrating Amazon GuardDuty with Wazuh for Enhanced Cloud Security

December 18th 2025 / Ambassadors
By Syed Jawad Ali Shah / Medium

By the end of this tutorial, you’ll have GuardDuty findings automatically flowing into your Wazuh dashboard, giving you centralized visibility into threats across your AWS environment.

Read more
Architecting Enterprise-Grade Email Alerting for Wazuh

Architecting Enterprise-Grade Email Alerting for Wazuh

December 15th 2025 / Ambassadors
By Syed Jawad Ali Shah / Medium

This comprehensive guide demonstrates how to architect a production-ready alert orchestration system that seamlessly integrates Wazuh, Python, and n8n to deliver executive-quality notifications for severity level 10+ security events.

Read more
Deploying Wazuh Agent on AWS EC2: A Complete Guide

Deploying Wazuh Agent on AWS EC2: A Complete Guide

December 10th 2025 / Ambassadors
By Syed Jawad / Medium

This guide walks you through the process of successfully deploying a Wazuh agent on an AWS EC2 instance, with a particular focus on understanding and configuring AWS security groups — a crucial prerequisite that many overlook.

Read more
Wazuh at the Heart of a Sovereign SOC Architecture for Public and Critical Infrastructures — Updated v4.0

Wazuh at the Heart of a Sovereign SOC Architecture for Public and Critical Infrastructures — Updated v4.0

December 9th 2025 / Ambassadors
By Ludovic Gildas Doamba / Medium

For sovereign entities, protecting digital infrastructure is not just a technical requirement. It is a matter of independence, resilience, and strategic control. This is precisely where Wazuh emerges as a cornerstone for sovereign cybersecurity architectures.

Read more
Getting Started with Wazuh: Your Comprehensive Security Guide

Getting Started with Wazuh: Your Comprehensive Security Guide

December 5th 2025 / Ambassadors
By Fanwell Sibanda / LinkedIn

This guide is a great resource because it cuts through the complexity. It walks you through Wazuh’s core components and more importantly, shows you how to leverage its key security capabilities.

Read more
Fighting the 2025 Threat Landscape with Wazuh

Fighting the 2025 Threat Landscape with Wazuh

December 4th 2025 / Ambassadors
By Thierry Rolland / Medium

This tutorial demonstrates how to configure and test Wazuh for File Integrity Monitoring (FIM) and MITRE ATT&CK– based detections in a Windows 10 SOC lab.

Read more