Our experiences define our identity
31 Dec
Deep SIEM Insights with Google Chronicle and Looker
Best of Both Worlds – Deep SIEM Insights with Powerful Business Intelligence Dashboards: Google Chronicle + Looker
Category: Business Intelligence, Google Chr...
Introduction to SIEM Security information and event management (SIEM) solutions collect a range of security and other data from security controls and devices throughout the IT e...
27 Oct
Introduction to Splunk Mission Control
Unify your SOC with Splunk Mission Control Plugins
Category: Splunk, Splunk Mission Control
Introduction to Splunk Mission Control Splunk Mission Control attempts to reinvent security operations, it’s a unified security operations platform that brings together security...
02 Sep
An Introduction on SonarQube1.1
An introduction on using SonarQube
Category: Quality and Security, SonarQube
An Introduction on SonarQube SonarQube is a Code Quality Assurance tool that collects and analyzes source code, and provides reports for the code quality of your project. It com...
28 Jul
Nexus Repository OSS
How to use Nexus OSS User Access Management
Category: Nexus OSS, Uncategorized
What is Nexus OSS Nexus OSS is a free artifact repository with universal format support. It provides a single source of truth for all your components, binaries, and build artifa...
05 Jun
Introduction: DevOps & Site Reliability Engineering
Category: DevOps, Site Reliability Engineering
Development and Operations Throughout the 80’s, and 90’s Systems Administrators (or  SysAdmins) wrote code to create, improve, and manage the computing systems under their ...
16 Apr
How to get your data from various services to MS Teams Channel
How to get your data from various services to MS Teams Channel
Category: MS Teams
MS Teams allows users to create a webhook that allows users to post data into the channel. The user can expose any HTTPS endpoint and design your own connectors. Microsoft has m...
17 Mar
Vulnerability detection using VulnDB integration with Nmap
Category: Vulnerability Detection
Vulnerability management is the process of identifying, classifying, prioritizing, remediating, and mitigating software vulnerabilities. It is crucial to computer security and n...
26 Feb
Advanced Threat Hunting harnessing Chronicle Backstory with Demisto
Advanced Threat Hunting Harnessing Chronicle Backstory with Demisto
Category: Cyber Security
Simplifying Threat Hunting & Remediation by harnessing Chronicle Backstory capabilities with Demisto’s Intelligence orchestration. The cybersecurity landscape is chang...
11 Feb
Splunk Search - Introduction to SPL
An introduction to the Splunk Search Processing Language
Category: Splunk, Splunk SPL
Overview Splunk offers an expansive processing language that enables a user to be able to reduce and transform large amounts of data from a dataset, into specific and relevant p...
20 Dec
web accessibility blog banner
Web Accessibility: How to Enable Access for Everyone
Category: Web Accessibility, Web Development
Accessibility is seldom discussed in today’s web development and design. The web is fundamentally designed to work for all people, regardless of their hardware, software, ...
This website uses cookies and asks your personal data to enhance your browsing experience.