https://www.xplg.com/wp-content/uploads/2020/03/main-image-tal.png200381Jane Kernelhttps://www.xplg.com/wp-content/uploads/2022/03/LogoDark1color.pngJane Kernel2020-03-15 08:10:372020-07-14 09:34:17Hybrid Cloud Challenges: How to optimize monitoring and analytics for ITOps
https://www.xplg.com/wp-content/uploads/2019/08/nginx-Blog-image-2.png200381Jane Kernelhttps://www.xplg.com/wp-content/uploads/2022/03/LogoDark1color.pngJane Kernel2019-08-20 07:14:332020-03-17 06:10:07NGINX Logs: The Full Guide to Monitoring and Analyzing Your NGINX Logs
https://www.xplg.com/wp-content/uploads/2019/06/cyber-security-cybersecurity.jpg200381Jane Kernelhttps://www.xplg.com/wp-content/uploads/2022/03/LogoDark1color.pngJane Kernel2019-06-30 14:30:092020-06-07 06:27:23What Should You Learn from the Massive Data Breach “Operation Soft Cell”?
https://www.xplg.com/wp-content/uploads/2019/06/S3-SECURITY.png200381Jane Kernelhttps://www.xplg.com/wp-content/uploads/2022/03/LogoDark1color.pngJane Kernel2019-06-12 09:23:292020-04-30 07:13:41S3 Security: How to Easily Secure and Audit AWS S3 Buckets?
https://www.xplg.com/wp-content/uploads/2016/02/security.jpg200381Jane Kernelhttps://www.xplg.com/wp-content/uploads/2022/03/LogoDark1color.pngJane Kernel2019-04-07 08:37:362020-05-05 08:21:05Linux Security Guide 2020: How to Investigate Suspected Break-in Attempts in Linux
https://www.xplg.com/wp-content/uploads/2018/11/windowsserver-1.jpg200381Jane Kernelhttps://www.xplg.com/wp-content/uploads/2022/03/LogoDark1color.pngJane Kernel2019-03-20 11:12:102021-03-16 09:58:53How to Look for Suspicious Activities in Windows Servers
https://www.xplg.com/wp-content/uploads/2019/01/adtechblog-1.jpg200381Jane Kernelhttps://www.xplg.com/wp-content/uploads/2022/03/LogoDark1color.pngJane Kernel2019-01-08 13:00:392022-03-08 11:49:05Case Study: How did a leading ad-tech firm increase application quality & lower response time/AWS costs?
https://www.xplg.com/wp-content/uploads/2019/01/Financial-blog-1.jpg200381Jane Kernelhttps://www.xplg.com/wp-content/uploads/2022/03/LogoDark1color.pngJane Kernel2019-01-08 10:21:282022-03-08 11:03:03Case Study: How the Largest Nordic Bank Improved Compliance & Ensured Comprehensive Data Protection