The Software Development Life Cycle (SDLC) is a framework defining tasks performed at each step in the software development process....
JoinedMay 2, 2023
Articles669
20+ years of experience and proven performance in large scale enterprise network infrastructure architecture, design, implementation, migration, security, operation, troubleshooting, leading/managing teams, and budgets. I have a BS in Cybersecurity and a Master's from the University of Florida.
Scenario: We have a subnet configured in the “Allowed prefixes,” a /16. You can’t change the size of a subnet...
CERT released a great tool to detect vulnerable Log4j applications. Source: https://github.com/CERTCC/CVE-2021-44228_scanner...
Palo Alto Networks firewalls provide URL filtering capabilities, which you can use to control access to websites by blocking or...
ROUTE DOMAIN Route Domains in F5 BIG-IP are a powerful feature that allows for the segmentation of network traffic, thus...
LLDP and CDP are both network discovery protocols, but they have some key differences: 1. Standardization and Vendor-Neutrality: LLDP is...
When configuring health monitors for a web application, targeting the appropriate HTTP status codes is crucial to ensure that the...
Log4j is a serious issue we have today. Probably one of the most serious vulnerabilities of my time. It’s so...
HOW TLS WORKS TLS version negotiation is typically performed as part of the SSL/TLS handshake process. When a client initiates...