
Observability vs. Monitoring: A Quick Guide
Observability and monitoring defined in the simplest terms can be viewed as, monitoring is to tell you when something goes…
Log4j Vulnerability
NIST has announced a zero-day global vulnerability (CVE-2021-44228) in the Apache Log4j logging library. The Apache Log4j utility is a…
Google Chronicle Security – Threat Detection & Hunting
Chronicle Security is a cloud service, which is built as a specialized layer on the top of the Google infrastructure,…
Introduction to Cypress Automation Testing
Introduction to Cypress Automation Testing: A Comparison of Testing Types “A good programmer is someone who always looks both ways…
Remediate Security Vulnerabilities in npm/Yarn dependencies
Two of the most popular package managers among the web development community are npm (Node Package Manager) and Yarn.
Best of Both Worlds – Deep SIEM Insights with Powerful Business Intelligence Dashboards: Google Chronicle + Looker
Security information and event management (SIEM) solutions collect a range of security and other data from security controls and devices…
Unify your SOC with Splunk Mission Control Plugins
Splunk Mission Control attempts to reinvent security operations, it’s a unified security operations platform that brings together security data, analytics,…
An introduction on using SonarQube
SonarQube is a Code Quality Assurance tool that collects and analyzes source code, and provides reports for the code quality…
Vulnerability detection using VulnDB integration with Nmap
Vulnerability management is the process of identifying, classifying, prioritizing, remediating, and mitigating software vulnerabilities. It is crucial to computer security…
Advanced Threat Hunting Harnessing Chronicle Backstory with Demisto
Simplifying Threat Hunting & Remediation by harnessing Chronicle Backstory capabilities with Demisto’s Intelligence orchestration.













