• Skip to primary navigation
  • Skip to content
  • Skip to footer
Running With Scissors
  • Home
  • About

    Where to next?

    • Cloud
    • Development
    • DFIR
    • GRC
    • Hardening
    • Hardware
    • Identity Access Management
    • IDS/IPS
    • Lock-picking
    • Misc
    • Mobile
    • Network
    • Pentesting
    • Reverse Engineering
    • Reporting
    • Radio Frequency
    • Social Engineering
    • SIEM
    • Tools
    • Web

    Security Information and Event Management

    What's on this page?

    • What is this about?

    What is this about?

    ELK stack, log correlation & management, alerting, …, will end up here.

    Coming soon!
    

    Beats

    Cortex

    ELK Stack

    Elastalert

    MISP

    OSQuery

    TheHive

    • Feed
    © 2021 Running With Scissors. Powered by Jekyll & Minimal Mistakes.