News
As enterprises move toward containerization and microservices, traditional job schedulers are often left behind. However, many organizations still rely on tried-and-true tools like SOS Berlin’s ...
Important: Elastic Stack security update (installed with SIEM) Type/Severity NetEye Product Security has rated this update as having a Critical security impact. Topic ...
A customer recently asked me to monitor printer logs. His use case was to check which users were doing the printing, and what they were printing on the company’s printers, including their page numbers ...
When we talk about security assessments, the first thing that comes to mind is a snapshot of a company’s security posture: vulnerabilities, misconfigurations, uncontrolled access, and so on. But ...
In this article I’ll guide you step-by-step through configuring Keycloak to connect to an LDAP server using a secure LDAPS (SSL/TLS) connection, with support for certificates signed by either internal ...
Introduction Windows environments rely heavily on authentication protocols like NTLM and Kerberos. While these protocols serve critical security purposes, they are also commonly abused during ...
Introduction Windows environments rely heavily on authentication protocols like NTLM and Kerberos. While these protocols serve critical security purposes, they are also commonly abused during ...
“Pipeline as Code” Quest Unlocked: A Grizzled Beginner Leveling Up in CI/CD After 17 years in software development, mostly crafting UIs (do you know Google Web Tookit? Or Angular, since version 1? And ...
An overview of the joint Axelos and Atlassian paper on integrating ITIL® 4 into modern ITSM workflows. In partnership with AXELOS, Atlassian has created a practical guide to help IT teams embrace this ...
One of the most annoying aspects of using Sealed Secrets is their encryption design. They are tightly coupled to the namespace and name of the target Secret, meaning any changes to either require ...
In most cases, we process the alerts sent by Alertmanager (Prometheus’ alert management system) using Tornado, where they are grouped based on labels – not following the traditional “Host” or “Service ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results