Blog Entries

07. 06. 2023 Federico Corona Red Team, SEC4U

Cracking the Code: Unveiling Data Breach Secrets through OSINT-driven Scripts

Welcome, today’s blog is dedicated to data breach analyses and evaluating their reliability. In an increasingly data-centric digital landscape, it’s crucial to delve into the complexities of data breaches and develop effective methods for determining the trustworthiness of the information they contain. In this blog, we’ll explore a professional approach to data breach analysis using…

Read More
04. 01. 2023 Mirko Morandini Asset Management, Unified Monitoring

Using GLPI with the Metabase Open Source BI Tool for Visualizing Rich Reports and Dashboards

Asset management/CMDB tools play (or should play!) a central role in IT operations and management, gathering data from hardware assets on contracts, software licenses, network configurations, tickets and many more. The key task is to keep all this data consistent and up to date. Rigor in manual data insertion and the careful integration of automation…

Read More
26. 11. 2018 Susanne Greiner ITOA, NetEye

How to Drop a Tag in InfluxDB

If  you’ve ever had cardinality problems with InfluxDB, you might have discovered that a tag is the likely culprit.  Well done!  But now your next step is getting rid of that tag, and that’s when you’ll realize that in a time series database, tags play an important role in indexing.  Because dropping tags is rather complicated,…

Read More
20. 12. 2017 Gabriele Cecco Service Management

How to Integrate the EriZone Customer Database with Web Services

One of the key points in the EriZone configuration is the connection to the database that contains information on the users of the system. A database without information on users has a negative effect on the incident management process. Let’s imagine that you are a Service Desk operator who has to work on an urgent…

Read More

Archive