Suppose you’re using lots of maps to make the navigation of your IT infrastructure more user friendly for your (management) user who’s not at all technically minded. That person wants to see the IT ...
Around this time last year, I wrote a blog post about improving cybersecurity with Elastic Defend. Now, one year later, we’ve gained a lot of practical experience with it, which I’d like to share.
In the world of Dynamics 365 and Power Platform administration, ensuring users have timely access to environments is a common challenge. The standard synchronization process between Azure Entra ...
After updating one of our machines, we found that some of our Ansible playbooks were failing with the following error: The include module was removed in ansible 2.16, while the include warning ...
During one of my last sessions with a customer I had to deal with a very particular use case, where I couldn’t use the solution presented in my previous blog post ...
Suppose you’re using lots of maps to make the navigation of your IT infrastructure more user friendly for your (management) user who’s not at all technically minded. That person wants to see the IT ...
In modern SOC environments, detection rules are the cornerstone of identifying malicious activity. However, the effectiveness of a rule depends not only on what it looks for but also on how precisely ...
The Model Context Protocol is an emerging open standard that defines how large language models and AI agents interact with external tools, services, and data sources. Instead of every AI provider ...
With the End of Support (EOS) date for Windows 10 approaching (it’s set in fact for October 14, 2025), companies must urgently plan their transition to Windows 11, as Windows 10 will no longer receive ...
Effective Vulnerability Management doesn’t end with detection, it ends with action. And to take the right action, you need clear, accurate, and timely reports. In today’s fast-moving threat landscape, ...
That’s a lot of moving parts. You could glue them together with scripts, sticky notes, and caffeine… but then most likely only one person will know how it actually works, and that person is usually on ...
We’ve addressed an issue where running the neteye satellite config create for a satellite configured in HA mode having whitespaces in the Zone name prevented the procedure to successfully execute.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results