What Tech Businesses Need to Know

In response to COVID-19 and the economic impact it is having on our country, the U.S. government has passed a sweeping $2.2 trillion economic stimulus package to help offset the devastating effects of the current downturn. Known as the CARES Act, the package includes $500 billion in assistance for distressed companies, $350 billion in loans for small businesses, $1,200 for low- and middle-income American workers, and more. CompTIA’s Advocacy team analyzed the package and identified the top 10 pieces that all tech businesses need to know, including:

SBA Paycheck Protection Program
SBA Economic Injury Disaster Loan (EIDL) Program
Federal Reserve loans for larger businesses
Payroll tax credit for impacted employers
Paid family, medical and sick leave
Broadband deployment funding
Education funding
Other federal IT funding
Direct aid to states
Individual rebates and expanded unemployment
The Elastic Stack for Cybersecurity

It is common for organizations around the world to use something called the Elastic Stack to visualize cybersecurity events. The term Elastic Stack refers to the use of Elasticsearch, Logstash and Kibana. It used to be called the ELK stack, until a few years ago. It’s possible to visualize all sorts of information through this stack, including intrusion detection information.
Capturing and Analyzing Network Traffic

You have many options for capturing packets and detecting cybersecurity events. Snort and Zeek (formerly Bro) are two well-known intrusion detection tools. For this example, I’m going to use Zeek, a free, open-source software for analyzing network traffic and identifying suspicious traffic.

First, I installed Zeek on an Ubuntu 18.04 Linux system using the following command. Other Linux-based systems use similar commands, and you’d also use similar commands to install the other elements of the Elastic Stack.

More Info: entry level it certifications

Comments

Popular posts from this blog

DDoS Attack Mean for My Security?

Profiling Hackers in the MITRE ATT&CK Navigator

The Importance of Post-Attack Analysis