Security Applications
A tool for generating a Software Bill of Materials (SBOM) from container images and filesystems.
Password Management
Password Management
Vulnerability Management
Vulnerability Management
Security Information Event Management (SIEM)
Combines SIM and SEM and provides real-time analysis of security alerts generated by network hardware and applications (1)Security Information Event Management (SIEM)
Log Management
Collection and storage of log messages and audit trailsLog Management
splunk>
Security Information Management (SIM)
Storage, analysis and reporting of log/audit dataSecurity Information Management (SIM)
Security Event Management (SEM)
Real-time monitoring, correlation, notifications and console viewsSecurity Event Management (SEM)
XDR
Gartner defines XDR as “a SaaS-based, vendor-specific, security threat detection and incident response tool that natively integrates multiple security products into a cohesive security operations system that unifies all licensed components.” (2)XDR
Acronyms
Acronyms
EDR
MSS
NTA
RMF
SIEM
SIM
SEM
SECaaS
UEBA
XDR
Endpoint Detection and Response
Managed Security Service
Network Traffic Analysis
Risk Management Framework
Security Information Event Management
Security Information Management
Security Event Management
SECurity as a Service
User and Entity Behaviour Analytics
eXtended Detection and Response
Bibliography & References
Bibliography & References
https://itsfoss.com/password-managers-linux/ https://www.rapid7.com/products/insight-platform/https://www.rapid7.com/products/insightidr/https://www.rapid7.com/products/insightvm/
(1) https://en.wikipedia.org/wiki/Security_information_and_event_management(2) https://en.wikipedia.org/wiki/Extended_detection_and_response
Password Managershttps://blog.knowbe4.com/what-about-password-manager-risks
Database Threatshttps://geekflare.com/database-threats-and-prevention-tools/https://www.imperva.com/resources/free-cyber-security-testing-tools/scuba-database-vulnerability-scanner/ (Scuba)
Malware Analysishttps://torrentfreak.com/are-pirate-streaming-apps-dangerous-using-free-tools-is-a-way-to-find-out-230722/https://app.any.run/https://www.hybrid-analysis.com/https://github.com/CYB3RMX/Qu1cksc0pehttps://mobsf.live/
(1) https://en.wikipedia.org/wiki/Security_information_and_event_management(2) https://en.wikipedia.org/wiki/Extended_detection_and_response
Password Managershttps://blog.knowbe4.com/what-about-password-manager-risks
Database Threatshttps://geekflare.com/database-threats-and-prevention-tools/https://www.imperva.com/resources/free-cyber-security-testing-tools/scuba-database-vulnerability-scanner/ (Scuba)
Malware Analysishttps://torrentfreak.com/are-pirate-streaming-apps-dangerous-using-free-tools-is-a-way-to-find-out-230722/https://app.any.run/https://www.hybrid-analysis.com/https://github.com/CYB3RMX/Qu1cksc0pehttps://mobsf.live/