In recent times, the cybersecurity landscape has become more challenging than ever. Microsoft grappled with a series of Distributed Denial...
JoinedMay 2, 2023
Articles669
20+ years of experience and proven performance in large scale enterprise network infrastructure architecture, design, implementation, migration, security, operation, troubleshooting, leading/managing teams, and budgets. I have a BS in Cybersecurity and a Master's from the University of Florida.
Both `applicationHost.config` and `web.config` can be used when managing IIS applications with CyberArk, and the choice between the two generally...
Sonatype Nexus Lifecycle is a part of the Sonatype Nexus platform, a suite of tools designed to help automate open-source...
There are several commands and operations that you can use in PowerShell to troubleshoot a Windows file server that is...
Monitoring a specific API endpoint like “http://cordero.me/api/gator/status” instead of the root website can have several advantages in the context of...
F5 iRules are a powerful tool set provided by F5’s BIG-IP application delivery platform. iRules allow you to directly manipulate...
The “push” and “pull” methods in CyberArk are primarily used for managing service accounts. However, they are not exclusive to...
CyberArk is a comprehensive cybersecurity platform that offers solutions for a multitude of security issues, including privileged access management (PAM)....
OPTION 1 To run the `ipconfig /displaydns` command on a remote PC named “pc-kcordero” in a Windows environment, you can...
To test TLS versions and HTTP versions using CURL, you can specify the desired TLS and HTTP versions using the...