Category Archives: Uncategorized

Wiz CSPM Explained: Agentless Cloud Security That Focuses on Real Risk and Difference between Wiz, Orca and DivvyCloud

Wiz CSPM Explained: How Security Teams Reduce Real Cloud Risk (Without Agents) Cloud environments move fast — and that’s exactly why cloud security can get messy. Misconfigurations, exposed secrets, over-privileged identities, and unpatched workloads often slip through the cracks. This is where Wiz CSPM really shines. Wiz is a modern, cloud-native security platform that helps… Read More »

How Affiliate Marketing Works for Beginners (Free Training Included)

Check out this free masterclass I found on affiliate marketing — no cost, just real training to start earning online Want to start earning online WITHOUT a product?I just watched a free webclass that shows how affiliate marketing works (no tech skills needed).It’s beginner-friendly and 100% free to join.Watch it here ! https://millionairepartnership.com/webclass-d24#aff=lathif5566 Affiliate marketing… Read More »

Python Automation for Vulnerability Management: Real-World Scripts Used in Enterprise Security and Interviews

Python Scripts for Vulnerability Management Automation Real-world Security Operations Use Cases Modern Vulnerability Management (VM) programs cannot scale with spreadsheets and manual tracking. To reduce risk, improve SLA compliance, and save operational hours, I built multiple Python-based automations covering the full VM lifecycle — from scan data ingestion to executive reporting. Below are real, production-grade… Read More »

What Is SELinux? Complete Guide to Configuration, Modes & Advantages

What Is SELinux? Complete Guide to SELinux Configuration, Modes, Commands, and Advantages SELinux (Security-Enhanced Linux) is a kernel-level security framework that provides Mandatory Access Control (MAC) to protect Linux systems from unauthorized access, privilege escalation, and zero-day attacks. Unlike traditional Linux permissions, SELinux enforces security policies even if a user or service is compromised. In… Read More »

Vulnerability Management: Prioritization, KPIs & Best Practices

VULNERABILITY MANAGEMENT is a continuous security process where we identify, assess, prioritize, and remediate security weaknesses in systems, applications, and networks before attackers can exploit them. It involves regular scanning, risk-based analysis, patching, and continuous monitoring to reduce the organization’s attack surface. Vulnerability Management is the ongoing process of finding, fixing, and tracking security weaknesses… Read More »

What is SIEM and how do you ingest logs into it

What is SIEM? (Security Information and Event Management)- Example – Sentinel- SPLUNK SIEM is a centralized platform that collects, normalizes, correlates, and analyzes security logs/events from across an organization to provide:Real-time threat detection=Incident investigation=Compliance reporting=Forensics and root-cause analysis1. Log Sources =Endpoints (Windows Event Logs, Sysmon, Linux auditd)=Servers (Application logs, database logs)Network Devices (Firewall, switch, IDS/IPS)=Cloud… Read More »

EDR (Endpoint Detection & Response)- Interview Point of View

EDR (Endpoint Detection & Response)- CLOUDSTRIKE-CARBONBLACK→ Secures endpoint devices only (laptops, servers, VMs).→ Focus is endpoint telemetry + detection + containment. Endpoint Detection and Response (EDR): EDR kicks in after a threat bypasses traditional defenses. It provides continuous monitoring, detection, and response capabilities for advanced threats and zero-days. • EDR helps in threat hunting, forensic… Read More »

Daily Tasks of a Security Engineer

What are your Daily EDR & SIEM Tasks for answering in Interviews On a daily basis, I monitor SIEM and EDR alerts and quickly triage them to separate real threats from false positives using process trees, log correlation, and user behavior. I respond to endpoint incidents by isolating infected machines, killing malicious processes, and supporting… Read More »

Script to add tomcat to start automatically upon reboot

We need to place the script to add tomcat to start automatically upon reboot inside the init.d directory. Follow the below steps: cd etc/init.d/ touch  tomcat vi tomcat Modify the java version and path as required marked in red in the content which will be pasted in tomcat file, and also the home directory where tomcat start… Read More »