PinnedJ. Isⲁⲁc 🥷inChronicles of SecurityNo SIEM, No Splunk, No Problem!I have been meaning to write a post on this for awhile now. There have been too many times to count where as an analyst I did not have the…Aug 1, 2021Aug 1, 2021
J. Isⲁⲁc 🥷inChronicles of SecuritySecuring Secrets w/ Key VaultsThis post details on how to secure your secrets from your applications in a Key VaJul 28, 2021Jul 28, 2021
J. Isⲁⲁc 🥷inChronicles of SecurityLogstash Input Pipeline mTLS Use CaseThis is a post on setting up an input listener that uses mTLS for Elastic’s Logstash application. Mutual TLS (mTLS) is best described as…Jul 27, 2021Jul 27, 2021