I recently watched a discussion on MAR unfold on WebEx. This guy had deployed MAR in his network, and now coming into the office, most
Author: Nicolai Borchorst
When managing a Stealthwatch deployment, all devices in the architecture is centrally managed by the Stealthwatch Management Console (SMC), which uses TLS Tunnels to communicate
Introduction I was recently involved in resizing a container instance for a customer. Despite searching everywhere, I could not find an official document that describes
Introduction When I was studying for the CCIE, one of the topics I found difficult to find enough information about was NGIPS. There were tons
Intro In December 2021, I passed the CCIE Security v6 lab exam, marking three years of preparation. The response I received on social media was