Recently Updated Pages
NG SIEM – LastPass Integration
Overview The LastPass Elastic Integration allows the ingestion of data from the LastPass Admin C...
GitHub Integration
GitHub Integration The GitHub integration collects events from the GitHub API. Logs Audit The...
AQUILA - Endpoint Detection and Response (EDR) Automatic Installation
Endpoint Detection and Response (EDR), is a cybersecurity technology that focuses on detecting, i...
AQUILA - Endpoint Detection and Response (EDR) Manual Installation
Endpoint Detection and Response (EDR), is a cybersecurity technology that focuses on detecting, i...
User and Entity Behavior Analysis (UEBA)
Overview This system is designed to monitor user behavior, detect anomalies, and track authentic...
Business Continuity Management (BCM)
Overview The Business Continuity Planning (BCP) module in AQUILA provides an easy way to documen...
Supply Chain Risk Management (SCRM)
Overview: This module offers a comprehensive, data-driven solution for managing the organization...
Business Impact Analysis (BIA)
Overview The Business Impact Analysis Dashboard provides a comprehensive view of the entire busi...
CyTech AQUILA - Unified Compliance Framework (UCB)
Overview The Unified Compliance Blueprint is a module within Cyber Compliance designed to help s...
Information Security Steering Committee (ISSC)
Overview The ISSC Meeting System is a centralized platform designed to help committees plan, man...
Cyber Training, Culture, and Awareness
Overview: The Cyber Training, Culture, and Awareness provides a centralized view of phishing sim...
Charters, Policies, and Procedures
Overview: The Charters, Policies, and Procedures Dashboard offer a centralized platform for mana...
Cyber Annual Workplan
Overview: The Cyber Annual Workplan Module Dashboard provides a comprehensive view of all ongoin...
Cyber Threat Intelligence (CTI)
Overview: The CTI (Cyber Threat Intelligence) Module provides real-time insights into emerging t...
Security Orchestration, Automation, and Response (SOAR)
Overview: The SOAR module helps streamline and enhance security operations by automating respons...
Cyber Risk Assessment Management (CRAM) / OUTDATED
Overview The Cyber Risk Assessment Management (CRAM) framework is designed to provide a comprehe...
JWT For Kali
To create a JSON Web Token (JWT) for Salesforce on Kali Linux, you can follow the steps below. Ka...
NG SIEM- AWS CSPM Integration
Introduction CSPM discovers and evaluates the services in your cloud environment, like storage, ...
Log Collector Installation - Linux Manual
Log Collector Installation in CyTech - AQUILA This guide outlines the step-by-step process for d...
AQUILA EDR Connection Issues - Windows
When Elastic Agent installs Endpoint, they connect locally to share status and updates. If this c...