In today’s fast-paced digital world, manually tracking and responding to cybersecurity threats is no longer enough. Automating threat intelligence helps organizations stay one step ahead by streamlining detection, analysis, and response.
This series of Patreon posts dives deep into the automation of Palo Alto Networks devices and software, offering you a comprehensive guide to streamlining and optimizing your security operations. Throughout the series, we explore how to automate various components, including firewalls, Cortex XDR, and Cortex XSOAR, to enhance your network security and incident response capabilities.
In this series, we’ll explore the core principles of network automation, essential tools, and practical techniques to streamline your network operations. Whether you’re new to the field or looking to sharpen your skills, our posts will provide the foundational knowledge you need to succeed.
Embark on a journey to elevate your network engineering skills by choosing the right path in network automation. Whether you’re looking to automate firewall management with Palo Alto Networks, streamline configurations with Ansible, or delve into advanced network emulation with UNetLab, this learning path has you covered.
In today’s interconnected world, securing and understanding Operational Technology (OT) and Industrial Control Systems (ICS) is more important than ever. This series of posts explores hands-on lab setups, security best practices, and key learning resources to help you build, test, and protect critical infrastructure.
Welcome to our series on Cisco Automation Solutions! In this series, we’ll explore how Cisco’s powerful tools and technologies, like Catalys Welcome to our series on Cisco Automation Solutions! In this series, we’ll explore how Cisco’s powerful tools and technologies, like Catalyst Center, APIs, and SDKs, can help automate network management, optimize configurations, and improve device monitoring.
A lot has already been said about Vulnerability Management (VM), and I’ve personally touched on this topic several times before. Yet, the reality is that managing vulnerabilities remains a significant challenge for most organizations.
There is much discussion around Zero Trust Architecture (ZTA), but it seems the concept of Assume Breach Design has yet to be formalized. Or, at least, a Google search does not yield results.
It’s time to revisit the ICS/OT world, as it has unique characteristics that influence its processes and tools. First, I would categorize this broad field into the following groups: Systems localized within a confined area (e.
In 2013, I presented a critical case that could cause a complete isolation of a datacenter. Eleven years later, the situation remains the same. Let’s reflect on a few points.