Apr 18, 2024 | Articles, Articles, Articles, Articles
A novel backdoor (CVE-2024-3094) was recently discovered from a widely used xz-utils ‘liblzma’ data compression library build system. This backdoor reportedly targets the OpenSSH server but has the potential to target any application that integrates with...
Apr 18, 2024 | Uncategorized
Operational Technology (OT) and manufacturing businesses are prime targets for cybercriminals. Why? Because OT security is lacking behind the IT sector, such as banking and retail. For example, ransomware attacks on OT systems are on the rise with twice as many...
Apr 11, 2024 | Uncategorized
Business intelligence (BI) is all about making sense of huge amounts of data to extract meaningful and actionable insights out of it. Log management tools such as Graylog, instead, are the perfect solution to streamline data collection and analysis, so it’s easy to...
Apr 11, 2024 | Uncategorized
Data replication has moved from “nice to have” to “mainstream” for use cases such as High Availability and Disaster Recovery. At the same time, companies are discovering the need to replicate or move data for other reasons, including performance and translating...