Building ML Threat Intelligence with Honeypot Data

Introduction

Picture this: you’re staring at security logs with thousands of events streaming in daily. Which ones are actually dangerous? Which can you safely ignore? Traditional signature-based detection is like playing whack-a-mole with cybercriminals — they’ve gotten really good at dodging known signatures faster than we can create them.

[Read More]

Amazon EKS SOC 2 Type II Compliance Checklist part 1

Introduction

Navigating the world of compliance can feel like trying to read a map in a language you don’t speak. When you throw Kubernetes into the mix, it gets even trickier. That’s why we’ve put together this straightforward, human-friendly checklist to help you get your Amazon EKS clusters ready for a SOC 2 Type II audit.

[Read More]

Amazon EKS SOC 2 Type II Compliance Checklist part 2

Moving on, let’s look at the other controls for EKS SOC Type 2.

For container security best practices, see our guide on Container Image Security with Wazuh and Trivy.


CC3: Risk Assessment


EKS-Specific Risk Assessment

Identify, evaluate, and document security, operational, and compliance risks specific to Amazon EKS clusters and workloads to ensure that appropriate controls are implemented, monitored, and improved in alignment with SOC 2 Trust Services Criteria.

[Read More]

Boosting Container Image Security Using Wazuh and Trivy

This article draws inspiration from the Wazuh blog post on enhancing container image security with Wazuh and Trivy.

Containerization has revolutionized software development and deployment, offering scalability and efficiency.

However, this agility can introduce security risks if container images aren’t properly secured.

Vulnerabilities within these images can expose your entire system to threats. This is where the combined power of Wazuh and Trivy comes in.

These open-source tools provide a comprehensive solution for boosting your container image security, ensuring your applications are protected from the ground up.

[Read More]

RAG for Wazuh Documentation: Step-by-Step Guide, Part 2

Related Reading:

Prerequisites and Environment Setup

For local RAG development, ensure you have the following requirements:

[Read More]

RAG for Wazuh Documentation: Step-by-Step Guide, Part 1

Introduction to RAG

Retrieval-Augmented Generation (RAG) is a method that allows the use of information from various sources to generate more accurate and useful responses to questions.

[Read More]

Enhancing Wazuh with Ollama: Cybersecurity Boost (Part 4)

Continuing the Series: Integrating a Wazuh Cluster with Ollama — Part 4. Configuration and Implementation

Related: Check out our Wazuh LLM fine-tuned model for specialized security event analysis.

[Read More]

Enhancing Wazuh with Ollama: Cybersecurity Boost (Part 3)

Wazuh and Ollama: Part 3. Creating Integration Between Your Wazuh Cluster and Ollama

Wazuh offers vast and nearly limitless possibilities for integration with various systems. Even if a specific feature is missing, you can always create your own custom integration.

[Read More]

Enhancing Wazuh with Ollama: Cybersecurity Boost (Part 2)

Wazuh and Ollama: Part 2. Deploying the Wazuh Cluster

Now it’s time to set up Wazuh, which we will integrate with Ollama.

[Read More]

Enhancing Wazuh with Ollama: Cybersecurity Boost (Part 1)

Introduction

Welcome to the first part of our guide on enhancing Wazuh with Ollama!

[Read More]