MySQL Encryption Using the Master Key

In this article, we'll look at how the master key is used and discuss the pros…


Microsoft introduced Azure Defender - a network security solution for IoT-devices

Microsoft has introduced a new Azure-based security solution to protect smart…


Where do malwares live: hacker infrastructure and criminal services

All online businesses need a stable and reliable infrastructure. The most…


GitOps: another buzzword or a breakthrough in automation?

Most of us, noticing another new term in the IT blogosphere or conferences,…


Network-as-a-Service for a large enterprise: a non-standard case

Over the past few years, we have seen an increased demand from customers for…


Infrastructure as Code in CI / CD Service Automation

The article describes PoC (Proof of concept) for solving the problem of…


OSINT or how to look at your network through the eyes of a hacker

Today I will tell you what information about an organization can be found in…


Where did the Confluence server disappear? Or Confluence Attachment Statistics

Have you ever run out of space on your Confluence server, but you don't know…