Operations | Monitoring | ITSM | DevOps | Cloud

Threat Hunting with Network Metadata

Maintaining a safe and secure network is not optional with an ever increasing amount of threats and methods of intrusion. Learn how you can leverage network metadata for fast and effective threat hunting, today. In this webinar, you will see how bringing together NetOps and SecOps information can help your organization continually locate and validate past and present indicators of compromise more efficiently

7 ITIL® 4 tips for service professionals by the ITIL 4 co-author | ITIL 4 overview, benefits & more

Presented by Barclay Rae, ITIL 4 co-author and a well-known ITSM consultant, this webinar focuses on the practical application of ITIL 4, using value streams, and the various areas of professionalism that are now included as part of the ITIL 4 portfolio.

Episode 15: Cookie Authentication in ASP.NET Core

Core Identity is the officially encouraged method of authenticating users in ASP.NET Core. As you might have guessed, we're not fans of the heavy handed, black box approach needed to make Core Identity "Just work". We want to use as much of the existing ASP.NET Authorization framework as we can while avoiding Core Identity. Thankfully, ASP.NET Supports cookie authorization without Core Identity!