It’s amazing how quickly you can deploy new functionality once you have a solid foundation in place. In his latest blog post Adrian Giacometti described how he implemented a security solution that allows network operators to block source IP addresses (identified by security tools) across dozens of firewalls using a bot listening to a Slack channel.
Would you be surprised if I told you we covered similar topics in our automation course? ?
Print
Share
Comment
Cite
Upload
Translate
APA
() » Automation Win: Chatops-Based Security. Retrieved from https://www.truth.cx/2021/01/12/automation-win-chatops-based-security/.
MLA" » Automation Win: Chatops-Based Security." - , https://www.truth.cx/2021/01/12/automation-win-chatops-based-security/
HARVARD » Automation Win: Chatops-Based Security., viewed ,
VANCOUVER - » Automation Win: Chatops-Based Security. [Internet]. [Accessed ]. Available from: https://www.truth.cx/2021/01/12/automation-win-chatops-based-security/
CHICAGO" » Automation Win: Chatops-Based Security." - Accessed . https://www.truth.cx/2021/01/12/automation-win-chatops-based-security/
IEEE" » Automation Win: Chatops-Based Security." [Online]. Available: https://www.truth.cx/2021/01/12/automation-win-chatops-based-security/. [Accessed: ]