COST: The cost is frequently a significant restriction in projects when it comes to network architecture. If we look at...
I’m hoping to post some examples in the near future but below is how you manipulate the traffic flow with...
These are great to know no matter what, especially with what’s going on with what LAPSUS is showing us with...
Source:https://docs.microsoft.com/en-us/security/cybersecurity-reference-architecture/mcra...
CERT released a great tool to detect vulnerable Log4j applications. Source: https://github.com/CERTCC/CVE-2021-44228_scanner...
Log4j is a serious issue we have today. Probably one of the most serious vulnerabilities of my time. It’s so...
Cisco Optics-to-Device Compatibility Matrix...
New and Changed Information The following table provides an overview of the significant changes up to the current release. The...