March 28, 2022

A few days ago, together with Rocco Sicilia and FESTO Academy , I presented a webinar on OT/ICS Cybersecurity approach. We are often spending time increasing Cybersecurity awareness, and that webinar was focused to gives Cybersecurity fundamentals to OT managers.

Post cover
March 25, 2022

These days I’m receiving more requests for help than ever. Most of them refer to suspicious emails, maybe because people are more aware, maybe because the current geopolitical situation is evolving fast.

Post cover
February 08, 2022

Any password policy, even with strict rules, can be easily bypassed with simple tricks: Passw0rd!, Passw0rd$, Password!1 can be all valid passwords for length and complexity. In this common scenario it’s useful to regularly audit Active Directory passwords against password dictionaries (like RockYou) and/or HaveIBeenPwned .

Post cover
February 02, 2022

I spent a few Twitch sessions speaking about the automation of Palo Alto Networks firewalls. We used different approaches than the one used with Cisco devices. Initially, we developed a few simple Ansible playbooks.

Post cover
January 13, 2022

I spent a few Twitch sessions speaking about the automation of Cisco devices with Ansible. I don’t think Ansible is the best tool and the best way to automate tasks on Cisco devices, but a well-designed and well-documented Ansible playbook can be maintained by non NetDevOps guys too.

Post cover
December 30, 2021

A few weeks ago a customer asked me to patch NTC Templates because it has a very old HP Procurve switch. I’m used to patching NTC Templates, it’s an important tool for my automation tasks.

Post cover
August 11, 2021

The following scripts allow cleaning a Docker host, and stopping and deleting containers and images. Stop all containers: #!/bin/bash CONTAINERS=$(docker ps -a | tail -n+2 | cut -d" " -f1) if [ "$CONTAINERS" == "" ]; then exit fi docker stop $CONTAINERS Stop and delete all containers:

Post cover
August 10, 2021

To debug a container or to access it, sometimes I need to override the entry point for a specific image: docker run -it --entrypoint /bin/sh [docker_image]

Post cover
March 07, 2021

Sometimes we realize we committed something that should remain confidential. Or maybe we are ready to publish our open source project and we don’t want to publish the entire history too.

Post cover
January 04, 2021

As human beings, due to our evolutionary background, we struggle to perceive the dangers of the digital world. We have always been accustomed to assessing risk based on our physical environment, evaluating the context (location, people, etc.

Post cover