News
Enter ITIL® 4, the latest evolution of the IT Infrastructure Library, and a powerful response to these changing demands.
All detection examples are mapped to techniques from the MITRE ATT&CK framework: ...
In most cases, we process the alerts sent by Alertmanager (Prometheus’ alert management system) using Tornado, where they are grouped based on labels – not following the traditional “Host” or “Service ...
Applying Templates with oc: A Side Quest in Shell Scripting One of my tasks used the oc CLI to apply an OpenShift template, a quick way to deploy both the app and its database. The command itself was ...
Hi! Today I want to talk to you about a nice tool that I stumbled upon in recent weeks: n8n. In these days automation has become a key driver for efficiency and innovation. From streamlining ...
When we talk about security assessments, the first thing that comes to mind is a snapshot of a company’s security posture: vulnerabilities, misconfigurations, uncontrolled access, and so on. But ...
Hi everybody. I’m Giuseppe and I was born in Milan in 1979. Since the early years of university, I was attracted by the Open Source world and operating system GNU\Linux. After graduation I had the ...
In this article I’ll guide you step-by-step through configuring Keycloak to connect to an LDAP server using a secure LDAPS (SSL/TLS) connection, with support for certificates signed by either internal ...
NeDi: Troubleshooting NeDi Discovery and Configuration File Backup A customer with a NetEye installation to which I had added the NeDi module asked me if I could integrate the saved configuration ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results