Articles
5 Reasons Why Developers Should Attend Security Conferences
4 min read
On the first night of BlackHat USA, I made conversation with a few friendly penetration testers who were perplexed when I told them I was a developer. Why would I be at a cybersecurity conference? …What was I hoping to get out of it? My general (and perhaps vague) response to them, and to others […]
How To Get Started Using LLMs in IT and Network Engineering
3 min read
LLMs can be thought of as the engine of Generative AI. See four use cases for using LLMs in applications specific to IT and network engineering.
Identify and Investigate Uncommon DNS Traffic
4 min read
See how you can programmatically gain visibility into and investigate uncommon DNS requests using Cisco Umbrella APIs.
1