Wazuh scripting made easy
In this article we will focus on the Framework layer and we will see how to use it to our advantage and how to write our own Wazuh scripts and APPs.
In this article we will focus on the Framework layer and we will see how to use it to our advantage and how to write our own Wazuh scripts and APPs.
San Jose, California, November 2024 – Wazuh, the leading provider of open-source Security Information and Event Management (SIEM) and Extended Detection and Response (XDR) solutions, has partnered with Digital Hand Made, a technology company specializing in network services and cybersecurity solutions. With more than 20 years of experience, Digital Hand Made is a trusted provider […]
Learn how to monitor the data stored in your S3 with Amazon Macie and Wazuh.
The Criminal Justice Information Services (CJIS) security policy 2022, version 5.9.1, establishes the standards for safeguarding sensitive criminal justice information (CJI) in the United States. Issued by the FBI, this policy specifies the necessary security measures to maintain the confidentiality, integrity, and availability of CJI throughout its lifecycle. It imposes stringent controls on data access […]
Network and Information Systems (NIS2) is a European Union (EU) legislation raising cybersecurity standards for businesses due to new cyber threats across the EU. It’s an update and expansion of the original NIS (Network and Information Systems) directive adopted in 2016. NIS2 broadens the scope to include energy, transport, banking, public administration, and space sectors. […]
User mode and kernel mode are two operating states within a computer system that define different levels of access and control to the hardware resources of a computer. Choosing the right mode between the two is important, as it affects the security and stability of the computer. User mode is a restricted operating environment where […]
Please make sure that all words are spelled correctly.