Two AI Assistants for Cybersecurity: Wazuh and AWS Under the LLM Microscope

When Your SOC Analyst Can’t Keep Up (Or Just Needs a Break)

Let’s be honest: analyzing thousands of security events every day isn’t the most exciting job.

[Read More]

Introducing Wazuh LLM: Fine-Tuned Llama 3.1 for Security Event Analysis

Introducing Wazuh LLM: Why Specialized Security Analysis Matters

In the cybersecurity world, SOC specialists deal with massive streams of security events daily. Analyzing each alert requires deep knowledge, experience, and time. That’s why I created a specialized language model to assist security analysts in their day-to-day operations.

[Read More]

Applying RAG for Working with Wazuh Documentation: A Step-by-Step Guide (Part 2)

Series Navigation:

Related Reading:

Prerequisites and Environment Setup

For local RAG development, ensure you have the following requirements:

[Read More]

Applying RAG for Wazuh Documentation: A Step-by-Step Guide (Part 1)

Introduction to RAG

Retrieval-Augmented Generation (RAG) is a method that allows the use of information from various sources to generate more accurate and useful responses to questions.

[Read More]

Enhancing Wazuh with Ollama: Boosting Cybersecurity (Part 4)

Continuing the Series: Integrating a Wazuh Cluster with Ollama — Part 4. Configuration and Implementation

Series Navigation:

[Read More]

Enhancing Wazuh with Ollama: Boosting Cybersecurity (Part 3)

Wazuh and Ollama: Part 3. Creating Integration Between Your Wazuh Cluster and Ollama

Series Navigation:

[Read More]

Enhancing Wazuh with Ollama: Boosting Cybersecurity (Part 2)

Wazuh and Ollama: Part 2. Deploying the Wazuh Cluster

Series Navigation:

[Read More]

Enhancing Wazuh with Ollama: A Cybersecurity Boost (Part 1)

Introduction

Welcome to the first part of our guide on enhancing Wazuh with Ollama!

[Read More]