In cybersecurity, most security shops push their teams to remediate all vulnerabilities identified by scanning tools immediately. This has proven to be an exhaustive task because there are always new vulnerabilities emerging and most importantly a good number of them
I had an issue where I was replacing an expiring PKI certificate in the Palo Alto firewall. The certificate imported was successful and it chained correctly under the intermediate and root certificate. However, when I tried referencing the new certificate
Subscribe to Vick
Subscribe today and get access to a private newsletter and new content every week!