News

Enter ITIL® 4, the latest evolution of the IT Infrastructure Library, and a powerful response to these changing demands.
All detection examples are mapped to techniques from the MITRE ATT&CK framework: ...
Cron Job Monitoring with Tornado (Part 2) In the first part we created hosts and services to monitor a sequence of script using Tornado. The Tornado Rule Now let’s continue with the creation of a ...
In most cases, we process the alerts sent by Alertmanager (Prometheus’ alert management system) using Tornado, where they are grouped based on labels – not following the traditional “Host” or “Service ...
Applying Templates with oc: A Side Quest in Shell Scripting One of my tasks used the oc CLI to apply an OpenShift template, a quick way to deploy both the app and its database. The command itself was ...
Hi! Today I want to talk to you about a nice tool that I stumbled upon in recent weeks: n8n. In these days automation has become a key driver for efficiency and innovation. From streamlining ...
When we talk about security assessments, the first thing that comes to mind is a snapshot of a company’s security posture: vulnerabilities, misconfigurations, uncontrolled access, and so on. But ...
Subject User vs. Target User In Windows authentication logs each event has two interesting fields: a Subject User and a Target User. The subject user refers to the account that initiated the action, ...
Hi everybody. I’m Giuseppe and I was born in Milan in 1979. Since the early years of university, I was attracted by the Open Source world and operating system GNU\Linux. After graduation I had the ...
In this article I’ll guide you step-by-step through configuring Keycloak to connect to an LDAP server using a secure LDAPS (SSL/TLS) connection, with support for certificates signed by either internal ...
Customizing the docsite As we can see, the docsite comes with the default Ansible theme and annotations. The antsibull-docs tool exposes some options to allow a bit of customization, but not all ...