Search
You can find the results of your search below.
Fulltext results:
- Formatting Syntax @wiki
- es. Simply have a look at the source of this page by pressing "Edit this page". If you want to try som... a paragraph, you can use two backslashes followed by a whitespace or the end of line. This is some te... nly recognized at the end of a line\\ or followed by\\ a whitespace \\this happens without it. This... y recognized at the end of a line\\ or followed by\\ a whitespace \\this happens without it. You sh
- Communications @pub:company
- ts, webinars, interviews, and podcast appearances by - Unicis and its team members. ^Platform ^H... can be used to promote original posts on LinkedIn by Unicis staff. Follow these steps if you think you... eye out for approval. Your post will be reviewed by the team and used in a promoted post if it’s deem... tsi]]. </WRAP> ==== Modifying an event organized by someone else ==== You can edit, duplicate or del
- Introduction to Development @pub
- ment|Agile]], but not limited to and not strictly by the book. ++++ Iterative, incremental, and evolu... trating software to customers regularly, at least by the end of each iteration. ++++ ====== Developm... ity and readability across our development teams. By following established guidelines and conventions,... e system responsiveness and resource utilization. By continually monitoring and optimizing our applica
- Products @pub:company
- , and quality testers. Product groups are grouped by business goal and designed to operate in parallel... uct group is responsible for security and privacy by default and by design, performance, stability, scalability, database migrations, release compatibilit... PR), each code change or logic should be reviewed by the lead or someone else. The reviewer is require
- What is Unicis? @pub
- nsparent for every business. We strive to do this by providing a single, comprehensive application tha... ==== Our mission is to empower startups and SMBs by offering a comprehensive solution that streamline... o improve compliance, security, risk, and privacy by automating and simplifying workflows. We are stri... an open-source solution for compliance management by the end of the fiscal year. This shows how commit
- Unicis SOC Plan @pub
- lyse incident trends and response times, enhanced by enriched threat data from MISP and Cortex. * Sh... les. * Updating MISP with new IoCs detected by Wazuh or validated by Cortex. * Quarantining affected endpoints using Wazuh triggers. * The
- Unicis.Tech @pub:company
- ag>remote}} ==== Open source ==== Unicis is open by design. Unicis Platform Community Edition is [[ht... ested? You can read the job description and apply by clicking on one of the positions. Please share a... ===== You can learn about the history of Unicis by looking at the timeline on our [[https://www.unic
- Source Code @pub:development
- === The repository is public and can be accessed by anyone at: [[https://github.com/UnicisTech/unicis... ingly. * **Merge Conflicts**: Resolve conflicts by pulling the latest changes and merging them into ... s://www.unicis.tech/community|Unicis Community]] By following this handbook, you will be well-equippe
- Privacy Policy @pub:trust_center:policies
- | We keep our privacy policy under regular review by applying privacy by default and by design approach. ++++ ++++ How to contact us| [[https://unicis.tech/contact|Contact f
- Abdulsamad Opeyemi Abdulganiyu (agastronics) - Public Page @user
- blic page ''//user:agastronics.txt//'', as stated by it's name, **can be read by anyone but only you can edit it** (or a superuser)... * You can introd
- Alexander Eklöf (alexander) - Public Page @user
- public page ''//user:alexander.txt//'', as stated by it's name, **can be read by anyone but only you can edit it** (or a superuser)... * You can introd
- Peter Zlatev (peter) - Public Page @user
- his public page ''//user:peter.txt//'', as stated by it's name, **can be read by anyone but only you can edit it** (or a superuser)... * You can introd
- Predrag Tasevski (predrag) - Public Page @user
- up> <WRAP half column> **Cyber Security & Privacy by Design Advocate | Certified ISO, DPO, CSPS, and m... e. He knows how to make security and privacy work by design and default. He also knows how to assess r
- @NAME@ (@USER@) - Public Page @user
- ic page ''//@TARGETPUBLICPAGE@.txt//'', as stated by it's name, **can be read by anyone but only you can edit it** (or a superuser)... * You can introd
- Vitaliy Nezdvetsky (vitaliy) - Public Page @user
- s public page ''//user:vitaliy.txt//'', as stated by it's name, **can be read by anyone but only you can edit it** (or a superuser)... * You can introd