Introduction to SIEM Security information and event management (SIEM) solutions collect a range of security and other data from security controls and devices throughout the IT e...
Introduction to Splunk Mission Control Splunk Mission Control attempts to reinvent security operations, it’s a unified security operations platform that brings together security...
An Introduction on SonarQube SonarQube is a Code Quality Assurance tool that collects and analyzes source code, and provides reports for the code quality of your project. It com...
What is Nexus OSS Nexus OSS is a free artifact repository with universal format support. It provides a single source of truth for all your components, binaries, and build artifa...
Development and Operations Throughout the 80’s, and 90’s Systems Administrators (or SysAdmins) wrote code to create, improve, and manage the computing systems under their ...
MS Teams allows users to create a webhook that allows users to post data into the channel. The user can expose any HTTPS endpoint and design your own connectors. Microsoft has m...
Vulnerability management is the process of identifying, classifying, prioritizing, remediating, and mitigating software vulnerabilities. It is crucial to computer security and n...
Simplifying Threat Hunting & Remediation by harnessing Chronicle Backstory capabilities with Demisto’s Intelligence orchestration. The cybersecurity landscape is chang...
Overview Splunk offers an expansive processing language that enables a user to be able to reduce and transform large amounts of data from a dataset, into specific and relevant p...
Accessibility is seldom discussed in today’s web development and design. The web is fundamentally designed to work for all people, regardless of their hardware, software, ...