PinnedPublished inAWS TipDeepSeek do the Seeking: Lets Go, “SOAR+AIng”In the last article, we covered the basics. Now, let’s dive into how we can actually start using DeepSeek API for AWS CloudTrail log…Feb 3Feb 3
PinnedPublished inSystem WeaknessHunt them in WindowsWhat is Windows Event Log?Jan 29, 2023Jan 29, 2023
Published inSystem WeaknessDeepSeek do the Seeking: Introduction “SOAR+AIng”In today’s fast-evolving cybersecurity landscape, automation is no longer just about employing workflows or integrations but it’s also…Feb 3Feb 3
Published inAWS TipColumnar DB DemystifiedAuthor’s Note: There is connection between “Data Lake” and “Columnar Databases”, Know it right!Aug 15, 2023Aug 15, 2023
ETL vs ELT — Choose your “Data Battles” wisely | 1st PartIn today’s data-driven world, information surrounds us in every move of our life. Data logs are generated from using mobile phones…Jul 14, 2023Jul 14, 2023
Published inSystem WeaknessAWS Security Lake (Data Lake)Before we dive into our discussion, I would suggest that you have a clear understanding of Database , Data Warehouse and Data Lake.Jun 10, 2023Jun 10, 2023
Can I clone you?"A digital twin, a clone so grand, Crafted with AI and voice command. A voice so real, it's hard to tell, If it's a human or machine as…Feb 6, 2023Feb 6, 2023
Published inSystem WeaknessGuide to ITAMA key step in building a successful security program is identifying and listing down the assets of your organization.Jan 17, 2023Jan 17, 2023