While working with Kibana, we recently encountered a puzzling situation: queries involving the field event.original returned ...
Watch the interview with Michael Schwartzkopff, who was among the speakers at the Open Source System Management Conference hosted by Würth Phoenix on May 10th in Bolzano. Michael gives his impressions ...
In this post I’ll describe how to update the certificate used by the Dynamics 365 Finance & Operations on-premises system (which I’ll call D365). This activity is called “certificate rotation” and it ...
With the upgrade to NetEye 4.44, we’ve added a lot of new features (https://www.neteye-blog.com/2025/10/neteye-4-44-release-notes/) and, from my point of view, one ...
The NetEye Conference 2025 in Verona offered a full day of deep-dive sessions, live use cases, and peer-to-peer learning – all centered around one guiding theme: Intelligent Operations in Action. Our ...
The atlassian-python-api library is one of the most effective tools available for Python-based Atlassian integrations. It ...
Producing actionable intelligence must be the mindset that every Threat Intelligence analyst must set as their primary objective. The problem of properly integrating Threat Intelligence into Security ...
As Atlassian experts, our work doesn’t stop at configuring environments or tailoring Jira, Confluence, and Bitbucket to match a customer’s processes. In many projects, we go a step further: we develop ...
Among the several plugins that Grafana provides is Node Graph, a useful plugin for visualizing elements and relationships between them. This plugin, as described in ...
Introduction Windows environments rely heavily on authentication protocols like NTLM and Kerberos. While these protocols serve critical security purposes, they are also commonly abused during ...
While working on some internal tools, I needed secure access to a few PHP pages and virtual directories resources that, by default, didn’t have any built-in access control. Since NetEye already uses ...