Automation Win: Chatops-Based Security

It’s amazing how quickly you can deploy new functionality once you have a solid foundation in place. In his latest blog post Adrian Giacometti described how he implemented a security solution that allows network operators to block source IP addre…

It’s amazing how quickly you can deploy new functionality once you have a solid foundation in place. In his latest blog post Adrian Giacometti described how he implemented a security solution that allows network operators to block source IP addresses (identified by security tools) across dozens of firewalls using a bot listening to a Slack channel.

Would you be surprised if I told you we covered similar topics in our automation course? ?


Print Share Comment Cite Upload Translate
APA
() » Automation Win: Chatops-Based Security. Retrieved from https://www.truth.cx/2021/01/12/automation-win-chatops-based-security/.
MLA
" » Automation Win: Chatops-Based Security." - , https://www.truth.cx/2021/01/12/automation-win-chatops-based-security/
HARVARD
» Automation Win: Chatops-Based Security., viewed ,
VANCOUVER
- » Automation Win: Chatops-Based Security. [Internet]. [Accessed ]. Available from: https://www.truth.cx/2021/01/12/automation-win-chatops-based-security/
CHICAGO
" » Automation Win: Chatops-Based Security." - Accessed . https://www.truth.cx/2021/01/12/automation-win-chatops-based-security/
IEEE
" » Automation Win: Chatops-Based Security." [Online]. Available: https://www.truth.cx/2021/01/12/automation-win-chatops-based-security/. [Accessed: ]
Select a language: