News
When we talk about security assessments, the first thing that comes to mind is a snapshot of a company’s security posture: vulnerabilities, misconfigurations, uncontrolled access, and so on. But ...
In this article I’ll guide you step-by-step through configuring Keycloak to connect to an LDAP server using a secure LDAPS (SSL/TLS) connection, with support for certificates signed by either internal ...
A customer with a NetEye installation to which I had added the NeDi module asked me if I could integrate the saved configuration files of “discovered” network devices with NeDi. NeDi, for those who ...
Introduction Windows environments rely heavily on authentication protocols like NTLM and Kerberos. While these protocols serve critical security purposes, they are also commonly abused during ...
Enter ITIL® 4, the latest evolution of the IT Infrastructure Library, and a powerful response to these changing demands.
In most cases, we process the alerts sent by Alertmanager (Prometheus’ alert management system) using Tornado, where they are grouped based on labels – not following the traditional “Host” or “Service ...
If you’ve ever tried integrating an external system or website with Jira Service Management (JSM), you’ve probably hit one or more roadblocks, especially when it comes to creating requests on behalf ...
Hi! Today I want to talk to you about a nice tool that I stumbled upon in recent weeks: n8n. In these days automation has become a key driver for efficiency and innovation. From streamlining ...
After 17 years in software development, mostly crafting UIs (do you know Google Web Tookit? Or Angular, since version 1? And now Vue.js? I do), occasionally diving into mobile apps, and even wearing ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results