News

Enter ITIL® 4, the latest evolution of the IT Infrastructure Library, and a powerful response to these changing demands.
All detection examples are mapped to techniques from the MITRE ATT&CK framework: ...
News about the open source IT system management solution NetEye and the open source IT service management solution EriZone provided by Würth Phoenix.
In most cases, we process the alerts sent by Alertmanager (Prometheus’ alert management system) using Tornado, where they are grouped based on labels – not following the traditional “Host” or “Service ...
After 17 years in software development, mostly crafting UIs (do you know Google Web Tookit? Or Angular, since version 1? And now Vue.js? I do), occasionally diving into mobile apps, and even wearing ...
In this article I’ll guide you step-by-step through configuring Keycloak to connect to an LDAP server using a secure LDAPS (SSL/TLS) connection, with support for certificates signed by either internal ...
Hi! Today I want to talk to you about a nice tool that I stumbled upon in recent weeks: n8n. In these days automation has become a key driver for efficiency and innovation. From streamlining ...
If you’ve ever worked with Windows authentication logs, you know they can be a chaotic mess. Even when you’re looking for something apparently simple and useful – like tracking admin logins – you ...
When we talk about security assessments, the first thing that comes to mind is a snapshot of a company’s security posture: vulnerabilities, misconfigurations, uncontrolled access, and so on. But ...
If you’ve ever tried integrating an external system or website with Jira Service Management (JSM), you’ve probably hit one or more roadblocks, especially when it comes to creating requests on behalf ...
A customer with a NetEye installation to which I had added the NeDi module asked me if I could integrate the saved configuration files of “discovered” network devices with NeDi. NeDi, for those who ...