cyber-101
What's the difference between "Policing" and "Shaping" when limiting bandwidth consumption?
Clarifying the differences between a couple similar terms.
cyber-101
How do we know that file type is REALLY that file type?
cyber-101
How picky can we be with Zscaler cloud app control?
cyber-101
Understanding the ingredients for risk...
cyber-101
A brief walk-through of the recommended phases to rollout TLS inspection.
coding-101
A very brief intro to comparing these AI systems.
cyber-101
How can Zscaler client connector tell it's on a trusted network?
cyber-101
Sequential steps and thought process for deploying the Zscaler client connector app.
cyber-101
A quick recap of what things the client connector can look for to assess local security state of an endpoint.
cyber-101
Defining agility of change updates on ZCC.
Cybersecurity and devops questions. Answered.
Exploring features and functionality for the client connector
A quick explanation of this FAZ feature
CLI commands for troubleshooting comm issues in FAZ.
Clarifying some terminology for FAZ
What logs can actually be sent to FAZ?
Discussing the different methods for establishing trust in data sources for FAZ.
Unpacking the basics of HA on FAZ
Let's discuss how data is structured, organized, and enforced on FAZ, shall we?
Uh oh. What happens when space runs out?
An intro to some of the essential commands in FortiOS.
Differentiating the operating modes for FAZ.
Clarifying on some vague terminology