How to respond to the GuardDuty Detection UnauthorizedAccess:EC2/TorClientAWS Guard Duty has detected that your instance is running TorClient. Tor is a software that allows users to browse the internet…Feb 9, 2022Feb 9, 2022
Cloud Security AutomationCloud security automation is the process of managing and orchestrating the security controls of cloud services and applications. Security…Feb 9, 2022Feb 9, 2022
How to get a job in Cyber-Security AutomationAre you interested in a career in cyber-security automation? If so, you’re in luck! There are many great job opportunities in this field…Feb 9, 2022Feb 9, 2022
10 Security Automation Engineer Interview QuestionsWith the increasing popularity of SOAR platforms and other Security Automation tools the “Security Automation Engineer” is becoming a more…Feb 9, 2022Feb 9, 2022
How to write good Yara RulesOne of the most important aspects of malware analysis is the ability to read and write yara rules. Yara rules are a way to describe malware…Feb 7, 2022Feb 7, 2022
How to Secure KubernetesKubernetes has been widely adopted in the enterprise for its ability to manage and orchestrate containerized applications at scale. As a…Feb 6, 2022Feb 6, 2022
AWS EC2 Security Groups Best PracticesAWS EC2 Security Groups are a firewall mechanism that enables you to control access to your instances by specifying which incoming traffic…Feb 6, 2022Feb 6, 2022