
August 5, 2020
Continuing on security and CIS controls, from my other blog post describing monitoring of DHCP using ELK, one of the other important aspects is to know what is installed on the computers and devices connectedRead More
Continuing on security and CIS controls, from my other blog post describing monitoring of DHCP using ELK, one of the other important aspects is to know what is installed on the computers and devices connectedRead More