A Tale of the Three *ishings: Part 1 – What is Phishing?

A Tale of the Three *ishings: Part 1 – What is Phishing?

Phishing has been and will continue to be one of the primary attack methods used by cyber attackers today. For the past twenty years, those of us in the cybersecurity industry have focused on how to use technology to secure technology, and we are getting pretty good...
Business Intelligence and Log management – Opportunities and challenges

Business Intelligence and Log management – Opportunities and challenges

Business intelligence (BI) is all about making sense of huge amounts of data to extract meaningful and actionable insights out of it. Log management tools such as Graylog, instead, are the perfect solution to streamline data collection and analysis, so it’s easy to...
Data replication: What is it and what are the advantages of using it?

Data replication: What is it and what are the advantages of using it?

Data replication has moved from “nice to have” to “mainstream” for use cases such as High Availability and Disaster Recovery. At the same time, companies are discovering the need to replicate or move data for other reasons, including performance and translating...