This post provides a consistent naming convention for your enterprise resources to ensure clarity, consistency, and easy identification. Importance of...
JoinedMay 2, 2023
Articles649
20+ years of experience and proven performance in large scale enterprise network infrastructure architecture, design, implementation, migration, security, operation, troubleshooting, leading/managing teams, and budgets. I have a BS in Cybersecurity and a Master's from the University of Florida.
Notes: By default, the AWS CLI will return the results in JSON format. If you prefer another format like text...
A Web Application Firewall (WAF) is designed to protect web applications by filtering and monitoring HTTP traffic between a web...
Transport Layer Security (TLS) is a protocol designed to provide secure communications over a computer network. Below is a simplified...
When we talk about network monitoring, particularly involving fiber optic networks, two units of measurement frequently arise decibel (dB) and...
What is LOA-CFA? In IT contexts, LOA-CFA stands for Letter of Authorization - Connecting Facility Assignment. This document is a...
Source: https://www.digicert.com/kb/digicert-root-certificates.htm Download DigiCert root and intermediate certificates DigiCert root certificates are widely trusted and used for issuing TLS Certificates to DigiCert customers—including educational,...
When setting up SSL/TLS encryption for an IIS web server, you might ask: Does IIS determine the supported cipher suites?...
Creating a development workflow with PROD (Production) and DEV (Development) environments using branches in a version control system like Git...
In today’s digital age, the growing dependence on cloud computing, virtualization, and the Internet of Things (IoT) has placed unprecedented...