Kerry CorderoKISS IT Design Principle - Human Error Prevention
  • Home
  • About
  • Disclaimer
  • Guides and Slides
    • AWS Well-Architected Framework
    • Facebook – Running BGP in the Data Center at Scale
    • Microsoft – Experiences with BGP in Large Scale Data Centers
    • Palo Alto PCNSE Study Guide
  • IP Calculator
  • Links
  • Contact
  • See all results
Home
Security
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Security

CloudSecurity

Okta Event-Type Logging Filters

These are great to know no matter what, especially with what’s going on with what LAPSUS is showing us with...
Read More
Security

CISA Free Cybersecurity Services and Tools

Security

Software Development Lifecycle (SDLC) Methodologies (Waterfall, Agile, Scrum)

The Software Development Life Cycle (SDLC) is a framework defining tasks performed at each step in the software development process....
Read More
Security

CISA Log4j (CVE-2021-44228) Vulnerability Guidance

Log4j is a serious issue we have today.  Probably one of the most serious vulnerabilities of my time.  It’s so...
Read More
Security

TLS Verification and Testing

HOW TLS WORKS TLS version negotiation is typically performed as part of the SSL/TLS handshake process. When a client initiates...
Read More
Security

Microsoft Cybersecurity Reference Architectures

Source:https://docs.microsoft.com/en-us/security/cybersecurity-reference-architecture/mcra...
Read More
SecurityServers

Microsoft AD Trusts from a Security Perspective

SEC-NET = Secure Network LESS-NET = The Less Secure Network When it comes to setting up domain trusts between networks...
Read More
Security

CVE-2021-44228_scanner

CERT released a great tool to detect vulnerable Log4j applications. Source: https://github.com/CERTCC/CVE-2021-44228_scanner...
Read More
Security

Palo Alto URL Filtering with Wildcards

Palo Alto Networks firewalls provide URL filtering capabilities, which you can use to control access to websites by blocking or...
Read More
Security

10 Malware Protection Best Practices

1. Update your frontline defenses Adhere to policies and best practices for application, system, and appliance security. Create unique passwords...
Read More
Load More

Categories

  • Business Management
  • Cloud
  • Code
  • Data Center
  • Laptops & Desktops
  • Load Balancing
  • Routing & Switching
  • Security
  • Servers
  • Uncategorized
  • VOIP
  • Wireless

Tags

Active Directory (AD) API AWS Azure Best Practices BGP Certificates Cisco Cisco ACI Cisco ASA Cisco ASR Cisco Catalyst Cisco CLI Cisco ISE Cisco Nexus Cisco Stack DDOS Design DNS EIGRP F5 F5-LTM HTTP(S) IP Addressing and Subnetting macOS Microsoft IIS Microsoft SQL Microsoft Windows OSPF Packet Capture Palo Alto Palo Alto CLI PDF Planning Ports PowerShell python QOS Splunk SSL Structured Cabling TLS Troubleshooting Upgrade VMWare
© 2025 cordero.me • All Rights Reserved
  • Home
  • About
  • Disclaimer
  • Guides and Slides
    • AWS Well-Architected Framework
    • Facebook – Running BGP in the Data Center at Scale
    • Microsoft – Experiences with BGP in Large Scale Data Centers
    • Palo Alto PCNSE Study Guide
  • IP Calculator
  • Links
  • Contact

Categories

  • Business Management
  • Cloud
  • Code
  • Data Center
  • Laptops & Desktops
  • Load Balancing
  • Routing & Switching
  • Security
  • Servers
  • Uncategorized
  • VOIP
  • Wireless

Tags

Active Directory (AD) API AWS Azure Best Practices BGP Certificates Cisco Cisco ACI Cisco ASA Cisco ASR Cisco Catalyst Cisco CLI Cisco ISE Cisco Nexus Cisco Stack DDOS Design DNS EIGRP F5 F5-LTM HTTP(S) IP Addressing and Subnetting macOS Microsoft IIS Microsoft SQL Microsoft Windows OSPF Packet Capture Palo Alto Palo Alto CLI PDF Planning Ports PowerShell python QOS Splunk SSL Structured Cabling TLS Troubleshooting Upgrade VMWare
Start typing to see results or hit ESC to close
Troubleshooting Palo Alto Microsoft Windows F5 Cisco
See all results