How has information security changed over the past 20 years. Part 2

As mentioned in our previous article, before the main motive for hackers was a…


How has information security changed over the past 20 years

If you look at the program of any modern conference on information security,…


What is Continuous Delivery?

Continuous Delivery is a set of software development methods. It helps to…


Security tips: Docker

Docker containers are the most popular containerization technology. Initially,…


Statistics and monitoring of PHP scripts in real time. ClickHouse and Grafana will help Pinba

In this article, I’ll show you how to use pinba with clickhouse and grafana…


SIEM: correlation rules and their environment

Now let's look at the correlation rules themselves through the eyes of the…


SIEM: Expertise. Whose correlation rules are better

Many of those who know about SIEM are familiar with the development of…


DevOps: how can an IT team do important things and earn more

Let’s check why attempts to "implement DevOps" do not make sense without a…