Skip to content

Guided Security

Short thoughts on learning more about cybersecurity

  • Home
  • About
  • Reading List

SumoLogic and Terraform: Detection as Code

Posted on February 10, 2022 by DruidSecurity

A talk I gave at SumoLogic Illuminate 2021.

Share this:

  • Twitter
  • Facebook

Like this:

Like Loading...

Related

Posted in Uncategorized

Post navigation

← Corporate Blog: Mailgun’s Log4j Defense
SIEM Use Cases: Defining ‘Why’ →

RSS Interesting Articles

  • Monitoring AWS IAM Access Analyzer with Amazon EventBridge September 13, 2021
  • How to inventory AWS accounts September 13, 2021
  • Cloud Security Orienteering September 13, 2021
  • AWS Security Hub Automated Response and Remediation September 13, 2021
  • A Step-By-Step Guide To Building a Trading Bot In Any Programming Language August 2, 2020
  • AWS Best Practices for DDoS Resiliency June 17, 2020
  • Denial of Wallet Attacks on AWS June 17, 2020
  • White Ops June 9, 2020
  • The Impending Doom of Expiring Root CAs and Legacy Clients June 9, 2020
  • SEC339 - Actionable threat hunting in AWS June 9, 2020
  • The importance of effective vulnerability remediation prioritization June 9, 2020
  • Level up your S3 skills by playing this game! June 5, 2020
  • Github uncovers malicious ‘Octopus Scanner’ targeting developers June 3, 2020
  • 2020-data-breach-investigations-report.pdf May 28, 2020
  • Netwalker Fileless Ransomware Injected via Reflective Loading May 28, 2020
  • 12th International Conference on Cyber Conflict. 20/20 Vision: The Next Decade. Proceedings 2020 May 25, 2020
  • Beyond the pandemic - How COVID-19 will shape the serious and organised crime landscape in the EU May 25, 2020
  • So You Inherited an AWS Account May 25, 2020
  • Security Analytics April 29, 2020
  • Git pre-commit validation of AWS CloudFormation templates with cfn-lint April 29, 2020

Tags

Adversary Emulation Analysts Aquatone Asset Management AWS Blacklist Career CDC Cloud cloud forensics Covid19 Cult of the Dead Cow cybersecurity Docker Docs DVSA GCIH GIAC Hackers Hacking Incident Response jobs kms Lambda Logging Malware Simulation Network Attack NIDS PCAP permissions Playbooks s3 SANS scanning Security SecurityOnion Serverless SIEM Storage study log Terraform tools Training
Website Powered by WordPress.com.
  • Follow Following
    • Guided Security
    • Already have a WordPress.com account? Log in now.
    • Guided Security
    • Customize
    • Follow Following
    • Sign up
    • Log in
    • Copy shortlink
    • Report this content
    • View post in Reader
    • Manage subscriptions
    • Collapse this bar
%d bloggers like this: