Kerry CorderoKISS Design - Human Error Prevention
  • Home
  • About
  • Disclaimer
  • Links
Home
Security
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Security

CloudSecurity

Okta Event-Type Logging Filters

These are great to know no matter what, especially with what’s going on with what LAPSUS is showing us with...
Read More
Security

CISA Free Cybersecurity Services and Tools

Security

CISA Log4j (CVE-2021-44228) Vulnerability Guidance

Log4j is a serious issue we have today.  Probably one of the most serious vulnerabilities of my time.  It’s so...
Read More
Security

10 Malware Protection Best Practices

1. Update your frontline defenses Adhere to policies and best practices for application, system, and appliance security. Create unique passwords...
Read More
Security

Best Practices to Strengthen the Security Posture of your Organization’s Systems

-Maintain up-to-date antivirus signatures and engines. -Keep operating system patches up-to-date. -Disable File and Printer sharing services. If these services...
Read More
Security

Microsoft Cybersecurity Reference Architectures

Source:https://docs.microsoft.com/en-us/security/cybersecurity-reference-architecture/mcra...
Read More
Security

CVE-2021-44228_scanner

CERT released a great tool to detect vulnerable Log4j applications. Source: https://github.com/CERTCC/CVE-2021-44228_scanner...
Read More
Security

Palo Alto URL Filtering with Wildcards

NOTES: A. Every domain/subdomain pattern would also match every subpage connected to these domains. B. In PAN-OS 9.1 and 10.0,...
Read More
CloudCodeData CenterLaptops & DesktopsLoad BalancingRouting & SwitchingSecurityServersVOIPWireless

Certificate Chains

There are three parts to a cert chain: Root Certificate: A root certificate is a digital certificate issued by the...
Read More
SecurityServers

Splunk – Searches for measuring data ingested

Load More

Categories

  • Cloud
  • Code
  • Data Center
  • Laptops & Desktops
  • Load Balancing
  • Routing & Switching
  • Security
  • Servers
  • Uncategorized
  • VOIP
  • Wireless

Tags

AWS Azure Best Practices BGP Certificates CISA Cisco Cisco ACI Cisco ACS Cisco ASA Cisco ASR Cisco Catalyst Cisco CLI Cisco ISE Cisco Nexus Cisco Stack Cisco Wireless DDOS Design DNS EIGRP F5 HP IP Sla Kali Logging macOS Microsoft IIS Microsoft Windows Netflow Okta OSPF Packet Capture Palo Alto Palo Alto CLI PDF Ports PowerShell QOS snmp Splunk SSL Structured Cabling Troubleshooting VMWare
Copyright © 2022 Kerry Cordero
  • Home
  • About
  • Disclaimer
  • Links

Categories

  • Cloud
  • Code
  • Data Center
  • Laptops & Desktops
  • Load Balancing
  • Routing & Switching
  • Security
  • Servers
  • Uncategorized
  • VOIP
  • Wireless

Tags

AWS Azure Best Practices BGP Certificates CISA Cisco Cisco ACI Cisco ACS Cisco ASA Cisco ASR Cisco Catalyst Cisco CLI Cisco ISE Cisco Nexus Cisco Stack Cisco Wireless DDOS Design DNS EIGRP F5 HP IP Sla Kali Logging macOS Microsoft IIS Microsoft Windows Netflow Okta OSPF Packet Capture Palo Alto Palo Alto CLI PDF Ports PowerShell QOS snmp Splunk SSL Structured Cabling Troubleshooting VMWare
Start typing to see results or hit ESC to close
Troubleshooting Palo Alto Microsoft Windows Cisco ASA PDF
See all results