pyToshka's DevSecOps Blog
  • Blog
  • About
  • Topics
  • Tags
  • Categories
  • Русский
pyToshka's DevSecOps Blog

Tags


devsecops 17

View all
Ollama in Wazuh Dashboard: AI Security Analysis Joining the Wazuh Ambassador Program Two LLM Security Assistants for Wazuh and AWS Analysis Wazuh LLM: Fine-Tuned Llama 3.1 for Security Analysis Building ML Threat Intelligence with Honeypot Data Amazon EKS SOC 2 Type II Compliance Checklist part 1 Amazon EKS SOC 2 Type II Compliance Checklist part 2 Boosting Container Image Security Using Wazuh and Trivy RAG for Wazuh Documentation: Step-by-Step Guide, Part 2 RAG for Wazuh Documentation: Step-by-Step Guide, Part 1 Enhancing Wazuh with Ollama: Cybersecurity Boost (Part 4) Enhancing Wazuh with Ollama: Cybersecurity Boost (Part 3) Enhancing Wazuh with Ollama: Cybersecurity Boost (Part 2) Enhancing Wazuh with Ollama: Cybersecurity Boost (Part 1) How to Set Up a Custom Integration between Wazuh and MARK Mitigation Anomaly Revelation Keeper(MARK) Meet me

security 15

View all
Ollama in Wazuh Dashboard: AI Security Analysis Joining the Wazuh Ambassador Program Two LLM Security Assistants for Wazuh and AWS Analysis Wazuh LLM: Fine-Tuned Llama 3.1 for Security Analysis Amazon EKS SOC 2 Type II Compliance Checklist part 1 Amazon EKS SOC 2 Type II Compliance Checklist part 2 RAG for Wazuh Documentation: Step-by-Step Guide, Part 2 RAG for Wazuh Documentation: Step-by-Step Guide, Part 1 Enhancing Wazuh with Ollama: Cybersecurity Boost (Part 4) Enhancing Wazuh with Ollama: Cybersecurity Boost (Part 3) Enhancing Wazuh with Ollama: Cybersecurity Boost (Part 2) Enhancing Wazuh with Ollama: Cybersecurity Boost (Part 1) How to Set Up a Custom Integration between Wazuh and MARK Mitigation Anomaly Revelation Keeper(MARK) Meet me

machine learning 14

View all
Ollama in Wazuh Dashboard: AI Security Analysis The Catcher in the Prompt: Day 60 The Day the LLM Stood Still: World Without AI Joining the Wazuh Ambassador Program Two LLM Security Assistants for Wazuh and AWS Analysis Wazuh LLM: Fine-Tuned Llama 3.1 for Security Analysis Building ML Threat Intelligence with Honeypot Data RAG for Wazuh Documentation: Step-by-Step Guide, Part 2 RAG for Wazuh Documentation: Step-by-Step Guide, Part 1 Enhancing Wazuh with Ollama: Cybersecurity Boost (Part 4) Enhancing Wazuh with Ollama: Cybersecurity Boost (Part 3) Enhancing Wazuh with Ollama: Cybersecurity Boost (Part 2) Enhancing Wazuh with Ollama: Cybersecurity Boost (Part 1) Mitigation Anomaly Revelation Keeper(MARK)

ai 13

View all
Ollama in Wazuh Dashboard: AI Security Analysis Only 1984 Tokens Remain: The Final Dissolution The Catcher in the Prompt: Day 60 The Day the LLM Stood Still: World Without AI Two LLM Security Assistants for Wazuh and AWS Analysis Wazuh LLM: Fine-Tuned Llama 3.1 for Security Analysis RAG for Wazuh Documentation: Step-by-Step Guide, Part 2 RAG for Wazuh Documentation: Step-by-Step Guide, Part 1 Enhancing Wazuh with Ollama: Cybersecurity Boost (Part 4) Enhancing Wazuh with Ollama: Cybersecurity Boost (Part 3) Enhancing Wazuh with Ollama: Cybersecurity Boost (Part 2) Enhancing Wazuh with Ollama: Cybersecurity Boost (Part 1) How to Set Up a Custom Integration between Wazuh and MARK

wazuh 13

View all
Ollama in Wazuh Dashboard: AI Security Analysis Joining the Wazuh Ambassador Program Two LLM Security Assistants for Wazuh and AWS Analysis Wazuh LLM: Fine-Tuned Llama 3.1 for Security Analysis Boosting Container Image Security Using Wazuh and Trivy RAG for Wazuh Documentation: Step-by-Step Guide, Part 2 RAG for Wazuh Documentation: Step-by-Step Guide, Part 1 Enhancing Wazuh with Ollama: Cybersecurity Boost (Part 4) Enhancing Wazuh with Ollama: Cybersecurity Boost (Part 3) Enhancing Wazuh with Ollama: Cybersecurity Boost (Part 2) Enhancing Wazuh with Ollama: Cybersecurity Boost (Part 1) How to Set Up a Custom Integration between Wazuh and MARK Meet me

llm 12

View all
Ollama in Wazuh Dashboard: AI Security Analysis Only 1984 Tokens Remain: The Final Dissolution The Catcher in the Prompt: Day 60 The Day the LLM Stood Still: World Without AI Two LLM Security Assistants for Wazuh and AWS Analysis Wazuh LLM: Fine-Tuned Llama 3.1 for Security Analysis RAG for Wazuh Documentation: Step-by-Step Guide, Part 2 RAG for Wazuh Documentation: Step-by-Step Guide, Part 1 Enhancing Wazuh with Ollama: Cybersecurity Boost (Part 4) Enhancing Wazuh with Ollama: Cybersecurity Boost (Part 3) Enhancing Wazuh with Ollama: Cybersecurity Boost (Part 2) Enhancing Wazuh with Ollama: Cybersecurity Boost (Part 1)

automation 10

View all
Ollama in Wazuh Dashboard: AI Security Analysis Two LLM Security Assistants for Wazuh and AWS Analysis Wazuh LLM: Fine-Tuned Llama 3.1 for Security Analysis Enhancing Wazuh with Ollama: Cybersecurity Boost (Part 4) Enhancing Wazuh with Ollama: Cybersecurity Boost (Part 3) Enhancing Wazuh with Ollama: Cybersecurity Boost (Part 2) Enhancing Wazuh with Ollama: Cybersecurity Boost (Part 1) How to Set Up a Custom Integration between Wazuh and MARK Mitigation Anomaly Revelation Keeper(MARK) Meet me

devops 10

View all
Wazuh LLM: Fine-Tuned Llama 3.1 for Security Analysis RAG for Wazuh Documentation: Step-by-Step Guide, Part 2 RAG for Wazuh Documentation: Step-by-Step Guide, Part 1 Enhancing Wazuh with Ollama: Cybersecurity Boost (Part 4) Enhancing Wazuh with Ollama: Cybersecurity Boost (Part 3) Enhancing Wazuh with Ollama: Cybersecurity Boost (Part 2) Enhancing Wazuh with Ollama: Cybersecurity Boost (Part 1) How to Set Up a Custom Integration between Wazuh and MARK Mitigation Anomaly Revelation Keeper(MARK) Meet me

cybersecurity 9

View all
Wazuh LLM: Fine-Tuned Llama 3.1 for Security Analysis Building ML Threat Intelligence with Honeypot Data RAG for Wazuh Documentation: Step-by-Step Guide, Part 2 RAG for Wazuh Documentation: Step-by-Step Guide, Part 1 Enhancing Wazuh with Ollama: Cybersecurity Boost (Part 4) Enhancing Wazuh with Ollama: Cybersecurity Boost (Part 3) Enhancing Wazuh with Ollama: Cybersecurity Boost (Part 2) Enhancing Wazuh with Ollama: Cybersecurity Boost (Part 1) Meet me

ollama 9

View all
Ollama in Wazuh Dashboard: AI Security Analysis Two LLM Security Assistants for Wazuh and AWS Analysis Wazuh LLM: Fine-Tuned Llama 3.1 for Security Analysis RAG for Wazuh Documentation: Step-by-Step Guide, Part 2 RAG for Wazuh Documentation: Step-by-Step Guide, Part 1 Enhancing Wazuh with Ollama: Cybersecurity Boost (Part 4) Enhancing Wazuh with Ollama: Cybersecurity Boost (Part 3) Enhancing Wazuh with Ollama: Cybersecurity Boost (Part 2) Enhancing Wazuh with Ollama: Cybersecurity Boost (Part 1)

incident response 8

View all
Wazuh LLM: Fine-Tuned Llama 3.1 for Security Analysis Enhancing Wazuh with Ollama: Cybersecurity Boost (Part 4) Enhancing Wazuh with Ollama: Cybersecurity Boost (Part 3) Enhancing Wazuh with Ollama: Cybersecurity Boost (Part 2) Enhancing Wazuh with Ollama: Cybersecurity Boost (Part 1) How to Set Up a Custom Integration between Wazuh and MARK Mitigation Anomaly Revelation Keeper(MARK) Meet me

threat intelligence 7

View all
Wazuh LLM: Fine-Tuned Llama 3.1 for Security Analysis Building ML Threat Intelligence with Honeypot Data Enhancing Wazuh with Ollama: Cybersecurity Boost (Part 4) Enhancing Wazuh with Ollama: Cybersecurity Boost (Part 3) Enhancing Wazuh with Ollama: Cybersecurity Boost (Part 2) Enhancing Wazuh with Ollama: Cybersecurity Boost (Part 1) Mitigation Anomaly Revelation Keeper(MARK)

monitoring 6

View all
Wazuh LLM: Fine-Tuned Llama 3.1 for Security Analysis Enhancing Wazuh with Ollama: Cybersecurity Boost (Part 4) Enhancing Wazuh with Ollama: Cybersecurity Boost (Part 3) Enhancing Wazuh with Ollama: Cybersecurity Boost (Part 2) Enhancing Wazuh with Ollama: Cybersecurity Boost (Part 1) Meet me

research 6

View all
Wazuh LLM: Fine-Tuned Llama 3.1 for Security Analysis Enhancing Wazuh with Ollama: Cybersecurity Boost (Part 4) Enhancing Wazuh with Ollama: Cybersecurity Boost (Part 3) Enhancing Wazuh with Ollama: Cybersecurity Boost (Part 2) Enhancing Wazuh with Ollama: Cybersecurity Boost (Part 1) Mitigation Anomaly Revelation Keeper(MARK)

log analysis 5

View all
Wazuh LLM: Fine-Tuned Llama 3.1 for Security Analysis Enhancing Wazuh with Ollama: Cybersecurity Boost (Part 4) Enhancing Wazuh with Ollama: Cybersecurity Boost (Part 3) Enhancing Wazuh with Ollama: Cybersecurity Boost (Part 2) Enhancing Wazuh with Ollama: Cybersecurity Boost (Part 1)

security operations 5

View all
Wazuh LLM: Fine-Tuned Llama 3.1 for Security Analysis Enhancing Wazuh with Ollama: Cybersecurity Boost (Part 4) Enhancing Wazuh with Ollama: Cybersecurity Boost (Part 3) Enhancing Wazuh with Ollama: Cybersecurity Boost (Part 2) Enhancing Wazuh with Ollama: Cybersecurity Boost (Part 1)

aws 4

View all
Two LLM Security Assistants for Wazuh and AWS Analysis Amazon EKS SOC 2 Type II Compliance Checklist part 1 Amazon EKS SOC 2 Type II Compliance Checklist part 2 Meet me

cloud security 4

View all
Two LLM Security Assistants for Wazuh and AWS Analysis Amazon EKS SOC 2 Type II Compliance Checklist part 1 Amazon EKS SOC 2 Type II Compliance Checklist part 2 Meet me

kubernetes 4

View all
Joining the Wazuh Ambassador Program Amazon EKS SOC 2 Type II Compliance Checklist part 1 Amazon EKS SOC 2 Type II Compliance Checklist part 2 Meet me

threat detection 4

View all
Joining the Wazuh Ambassador Program Two LLM Security Assistants for Wazuh and AWS Analysis How to Set Up a Custom Integration between Wazuh and MARK Meet me

compliance 3

View all
Amazon EKS SOC 2 Type II Compliance Checklist part 1 Amazon EKS SOC 2 Type II Compliance Checklist part 2 Meet me

container security 3

View all
Amazon EKS SOC 2 Type II Compliance Checklist part 1 Amazon EKS SOC 2 Type II Compliance Checklist part 2 Boosting Container Image Security Using Wazuh and Trivy

security monitoring 3

View all
Ollama in Wazuh Dashboard: AI Security Analysis Boosting Container Image Security Using Wazuh and Trivy Meet me

siem 3

View all
Ollama in Wazuh Dashboard: AI Security Analysis Joining the Wazuh Ambassador Program How to Set Up a Custom Integration between Wazuh and MARK

artificial intelligence 2

View all
The Catcher in the Prompt: Day 60 The Day the LLM Stood Still: World Without AI

audit 2

View all
Amazon EKS SOC 2 Type II Compliance Checklist part 1 Amazon EKS SOC 2 Type II Compliance Checklist part 2

aws security 2

View all
Amazon EKS SOC 2 Type II Compliance Checklist part 1 Amazon EKS SOC 2 Type II Compliance Checklist part 2

chatgpt 2

View all
The Catcher in the Prompt: Day 60 The Day the LLM Stood Still: World Without AI

cis benchmark 2

View all
Amazon EKS SOC 2 Type II Compliance Checklist part 1 Amazon EKS SOC 2 Type II Compliance Checklist part 2

docker 2

View all
Joining the Wazuh Ambassador Program Meet me

eks 2

View all
Amazon EKS SOC 2 Type II Compliance Checklist part 1 Amazon EKS SOC 2 Type II Compliance Checklist part 2

future 2

View all
The Catcher in the Prompt: Day 60 The Day the LLM Stood Still: World Without AI

humor 2

View all
The Catcher in the Prompt: Day 60 The Day the LLM Stood Still: World Without AI

kubernetes security 2

View all
Boosting Container Image Security Using Wazuh and Trivy Meet me

llms for documentation 2

View all
RAG for Wazuh Documentation: Step-by-Step Guide, Part 2 RAG for Wazuh Documentation: Step-by-Step Guide, Part 1

prometheus 2

View all
Joining the Wazuh Ambassador Program Meet me

rag 2

View all
RAG for Wazuh Documentation: Step-by-Step Guide, Part 2 RAG for Wazuh Documentation: Step-by-Step Guide, Part 1

retrieval-augmented generation 2

View all
RAG for Wazuh Documentation: Step-by-Step Guide, Part 2 RAG for Wazuh Documentation: Step-by-Step Guide, Part 1

satire 2

View all
The Catcher in the Prompt: Day 60 The Day the LLM Stood Still: World Without AI

soc 2 2

View all
Amazon EKS SOC 2 Type II Compliance Checklist part 1 Amazon EKS SOC 2 Type II Compliance Checklist part 2

tech culture 2

View all
The Catcher in the Prompt: Day 60 The Day the LLM Stood Still: World Without AI

thoughts 2

View all
The Catcher in the Prompt: Day 60 The Day the LLM Stood Still: World Without AI

vulnerability management 2

View all
Boosting Container Image Security Using Wazuh and Trivy Meet me

adtech 1

View all
Meet me

advertising-technology 1

View all
Meet me

agile 1

View all
Meet me

ai-ops 1

View all
Meet me

airlines 1

View all
Meet me

alerting 1

View all
Meet me

amazon-web-services 1

View all
Meet me

ambassador 1

View all
Joining the Wazuh Ambassador Program

anomaly detection 1

View all
Building ML Threat Intelligence with Honeypot Data

ansible 1

View all
Meet me

apm 1

View all
Meet me

argocd 1

View all
Meet me

attack classification 1

View all
Building ML Threat Intelligence with Honeypot Data

availability 1

View all
Meet me

aviation 1

View all
Meet me

aws-certified 1

View all
Meet me

azure 1

View all
Meet me

backup-strategies 1

View all
Meet me

banking 1

View all
Meet me

bash-scripting 1

View all
Meet me

build-automation 1

View all
Meet me

business-continuity 1

View all
Meet me

capacity-planning 1

View all
Meet me

career-development 1

View all
Meet me

cdn 1

View all
Meet me

certifications 1

View all
Meet me

certified-kubernetes-administrator 1

View all
Meet me

chaos-engineering 1

View all
Meet me

chef 1

View all
Meet me

cicd 1

View all
Meet me

cka 1

View all
Meet me

cloud-architecture 1

View all
Meet me

cloud-cost-optimization 1

View all
Meet me

cloud-migration 1

View all
Meet me

cloud-native 1

View all
Meet me

cloudformation 1

View all
Meet me

community 1

View all
Joining the Wazuh Ambassador Program

compliance scanning 1

View all
Boosting Container Image Security Using Wazuh and Trivy

consciousness 1

View all
Only 1984 Tokens Remain: The Final Dissolution

container runtime security 1

View all
Boosting Container Image Security Using Wazuh and Trivy

container-orchestration 1

View all
Meet me

containerization 1

View all
Meet me

context window 1

View all
Only 1984 Tokens Remain: The Final Dissolution

continuous-deployment 1

View all
Meet me

continuous-integration 1

View all
Meet me

cost-optimization 1

View all
Meet me

cross-functional-teams 1

View all
Meet me

cve detection 1

View all
Boosting Container Image Security Using Wazuh and Trivy

dashboard 1

View all
Ollama in Wazuh Dashboard: AI Security Analysis

data-persistence 1

View all
Meet me

database-automation 1

View all
Meet me

database-clustering 1

View all
Meet me

database-performance 1

View all
Meet me

datasets 1

View all
Building ML Threat Intelligence with Honeypot Data

deployment-automation 1

View all
Meet me

developer-experience 1

View all
Meet me

disaster-recovery 1

View all
Meet me

distributed-teams 1

View all
Meet me

dns 1

View all
Meet me

docker security 1

View all
Boosting Container Image Security Using Wazuh and Trivy

dubai 1

View all
Meet me

dystopia 1

View all
Only 1984 Tokens Remain: The Final Dissolution

edge-computing 1

View all
Meet me

elasticsearch 1

View all
Meet me

elk-stack 1

View all
Meet me

engineering-management 1

View all
Meet me

enterprise 1

View all
Meet me

event-driven-architecture 1

View all
Meet me

existential 1

View all
Only 1984 Tokens Remain: The Final Dissolution

feature engineering 1

View all
Building ML Threat Intelligence with Honeypot Data

fine-tuning 1

View all
Wazuh LLM: Fine-Tuned Llama 3.1 for Security Analysis

fintech 1

View all
Meet me

flux 1

View all
Meet me

fortune-500 1

View all
Meet me

gcp 1

View all
Meet me

github-actions 1

View all
Meet me

gitlab-ci 1

View all
Meet me

gitops 1

View all
Meet me

global-infrastructure 1

View all
Meet me

go-microservices 1

View all
Meet me

go-programming 1

View all
Meet me

golang 1

View all
Meet me

google-cloud-architect 1

View all
Meet me

google-cloud-platform 1

View all
Meet me

grafana 1

View all
Meet me

hashicorp-certified 1

View all
Meet me

hashicorp-vault 1

View all
Meet me

helm 1

View all
Meet me

high-availability 1

View all
Meet me

honeypot 1

View all
Building ML Threat Intelligence with Honeypot Data

hugging face 1

View all
Building ML Threat Intelligence with Honeypot Data

huggingface 1

View all
Two LLM Security Assistants for Wazuh and AWS Analysis

hybrid-cloud 1

View all
Meet me

iac 1

View all
Meet me

image scanning 1

View all
Boosting Container Image Security Using Wazuh and Trivy

incident-management 1

View all
Meet me

infrastructure-as-code 1

View all
Meet me

infrastructure-automation 1

View all
Meet me

integration 1

View all
How to Set Up a Custom Integration between Wazuh and MARK

internal-developer-platforms 1

View all
Meet me

international 1

View all
Meet me

ip reputation 1

View all
Mitigation Anomaly Revelation Keeper(MARK)

istio 1

View all
Meet me

javascript 1

View all
Meet me

jenkins 1

View all
Meet me

k8s 1

View all
Meet me

kibana 1

View all
Meet me

kubernetes-operators 1

View all
Meet me

linux 1

View all
Meet me

load-balancing 1

View all
Meet me

logging 1

View all
Meet me

logstash 1

View all
Meet me

machine-learning-ops 1

View all
Meet me

malware analysis 1

View all
Mitigation Anomaly Revelation Keeper(MARK)

mark 1

View all
How to Set Up a Custom Integration between Wazuh and MARK

media-streaming 1

View all
Meet me

mentoring 1

View all
Meet me

metrics 1

View all
Meet me

microservices 1

View all
Meet me

microservices-architecture 1

View all
Meet me

microsoft-azure 1

View all
Meet me

middle-east 1

View all
Meet me

mitre att&ck 1

View all
Wazuh LLM: Fine-Tuned Llama 3.1 for Security Analysis

ml 1

View all
How to Set Up a Custom Integration between Wazuh and MARK

mlops 1

View all
Meet me

mongodb 1

View all
Meet me

multi-cloud 1

View all
Meet me

multi-region 1

View all
Meet me

mysql 1

View all
Meet me

network security 1

View all
Building ML Threat Intelligence with Honeypot Data

networking 1

View all
Meet me

nginx 1

View all
Meet me

nlp for documentation 1

View all
RAG for Wazuh Documentation: Step-by-Step Guide, Part 1

observability 1

View all
Meet me

open-source 1

View all
Joining the Wazuh Ambassador Program

openshift 1

View all
Meet me

operational-excellence 1

View all
Meet me

orwell 1

View all
Only 1984 Tokens Remain: The Final Dissolution

ossec 1

View all
Joining the Wazuh Ambassador Program

packer 1

View all
Meet me

performance 1

View all
Meet me

performance-management 1

View all
Meet me

performance-tuning 1

View all
Meet me

pipeline-optimization 1

View all
Meet me

platform-engineering 1

View all
Meet me

postgresql 1

View all
Meet me

procurement 1

View all
Meet me

professional-development 1

View all
Meet me

project-management 1

View all
Meet me

puppet 1

View all
Meet me

python 1

View all
Meet me

python-automation 1

View all
Meet me

rag for wazuh 1

View all
RAG for Wazuh Documentation: Step-by-Step Guide, Part 1

redis 1

View all
Meet me

release-management 1

View all
Meet me

reliability 1

View all
Meet me

remote-work 1

View all
Meet me

risk-management 1

View all
Meet me

russia 1

View all
Meet me

scalability 1

View all
Meet me

scripting 1

View all
Meet me

scrum 1

View all
Meet me

secrets-management 1

View all
Meet me

security analytics 1

View all
Building ML Threat Intelligence with Honeypot Data

security best practices 1

View all
Boosting Container Image Security Using Wazuh and Trivy

security-automation 1

View all
Meet me

security-scanning 1

View all
Meet me

serverless 1

View all
Meet me

service-mesh 1

View all
Meet me

shell-scripting 1

View all
Meet me

site-reliability-engineering 1

View all
Meet me

slo-sli 1

View all
Meet me

soc tools 1

View all
Mitigation Anomaly Revelation Keeper(MARK)

sre 1

View all
Meet me

stakeholder-management 1

View all
Meet me

startup-to-enterprise 1

View all
Meet me

system prompt 1

View all
Only 1984 Tokens Remain: The Final Dissolution

system-administration 1

View all
Meet me

team-management 1

View all
Meet me

tech horror 1

View all
Only 1984 Tokens Remain: The Final Dissolution

technical-leadership 1

View all
Meet me

technical-strategy 1

View all
Meet me

telecommunications 1

View all
Meet me

terraform 1

View all
Meet me

terraform-associate 1

View all
Meet me

threat analysis 1

View all
Ollama in Wazuh Dashboard: AI Security Analysis

threat hunting 1

View all
Building ML Threat Intelligence with Honeypot Data

timezone-management 1

View all
Meet me

tracing 1

View all
Meet me

training 1

View all
Meet me

trilogy 1

View all
Only 1984 Tokens Remain: The Final Dissolution

trivy integration 1

View all
Boosting Container Image Security Using Wazuh and Trivy

uae 1

View all
Meet me

varnish 1

View all
Meet me

vault-automation 1

View all
Meet me

vendor-management 1

View all
Meet me

victoriametrics 1

View all
Meet me

vulnerability scanning 1

View all
Boosting Container Image Security Using Wazuh and Trivy

zero-trust 1

View all
Meet me

pyToshka  • © 2026  •  pyToshka's DevSecOps Blog