Submitting the form

All results for 'Ayomide David Shoyemi'

Showing 10 of 10 results

Container vulnerability scanning with Wazuh and Snyk

Blog / Engineering / Container vulnerability scanning with Wazuh and Snyk

Conducting container vulnerability scans is an approach to protecting containers and the infrastructure that supports them. Containers provide isolated environments for applications, maintaining consistency across other platforms. Detecting and resolving...

Load balancing a Wazuh server cluster using NGINX

Blog / Engineering / Load balancing a Wazuh server cluster using NGINX

Load balancing refers to the distribution of workloads across multiple servers within a network infrastructure, including both backend and front-end servers. The use of a load balancer (LB) in a...

Wazuh v3.12.0 released

Blog / Releases / Wazuh v3.12.0 released

Hi everyone. The team is pleased to announce that Wazuh 3.12.0 is released. This new version comes with lots of additions and improvements. Here are the highlights: Wazuh core This...

Wazuh 4.0 released

Blog / Releases / Wazuh 4.0 released

We are glad to announce that Wazuh 4.0.0 is released. Discover the new additions and improvements here! Wazuh is now better than ever. New features and changes in Wazuh 4.0...

Human Managed and Wazuh sign a partnership agreement

Blog / News / Human Managed and Wazuh sign a partnership agreement

...The HM platform executes on the course of action to either react to or resolve the issue with prioritization.”, adds David Medallo, Director. “We are especially pleased that an organization...

Security Validation and Wazuh sign a partnership agreement

Blog / News / Security Validation and Wazuh sign a partnership agreement

...partner. The product and, more importantly, the support has far exceeded that which we received from other vendors.” commented David Durko, CEO of Security Validation. Security Validation provides managed security...

Wazuh Agent As A Docker Container

One problem I have faced is having different SIEMS monitoring one host device for instance you need different logs from one endpoint device…

What is SIEM?

Security Information and Event Management (or SIEM) is a subset of the computer security field…

No results for 'Ayomide David Shoyemi'

Please make sure that all words are spelled correctly.