Technology
Unlike business applications, Cybersecurity intelligence solutions must essentially follow cyber criminals using the very tools and technologies they rely on.
Essentially, most tools are, or are based on, open source technologies – and range from dedicated Linux distributions, Python scripts, Tor browsers, Java utilities and many more – all loosely clubbed under OSINT tools (Open Source Intelligence).
There is a complete community of tool developers, white hat hackers, market places and thousands of experienced cybersecurity experts that are all baked into the technology platform that powers watchOUT.
As you will see from the Architecture notes the technology must essentially be extremely flexible to accommodate additions and changes on-the-fly. As the technology itself learns from the massive amount of data it ingests, and as the cybersecurity analysts keep nudging and tweaking the tool sets, we must use technology that supports this fluid nature.
Persistence
MySql, ElasticSearch, MongoDB
Languages
Python, Java
Cloud
AWS, on-premise, co-located servers
User Interface
Django
Operating System
Kali Linux
Browser
Tor
Resources
Qualified and experienced Cybersecurity experts
Toolset
OSINT and proprietary code
OSINT Framework
Interesting Reads!
- Insights
- February 27, 2021
Logging – Missing The Trees For The Forest
- Insights
- February 27, 2021
RAT’s in your Enterprise IT!
- Insights
- February 27, 2021
Security of Things
- Sales
- February 26, 2021