Dec 5, 2023 | Uncategorized
In the world of security awareness training, we like to think of ourselves as providing training for each employee in the building. There was a time when training non-cyber staff on cyber threats was a novel idea. But, as it became apparent that end users were...
Nov 28, 2023 | Articles, Articles, Articles, Articles
This is the 12th part of my syslog-ng tutorial. Last time, we learned about enriching log messages using syslog-ng. Today, we learn about how to send log messages to Elasticsearch. You can watch the video or read the text below. History of Elasticsearch support...
Nov 28, 2023 | Uncategorized
Anomalous behavior analytics is one of the many advantages that big data analytics brings to the table. What role does log monitoring have in this process, and how does it work together with behavioral analytics? Behavior analytics is a powerful tool in...
Nov 9, 2023 | Uncategorized
While the tech world was looking forward to the upcoming release of the iPhone 15 in September, an exciting development is taking place in the market which could have a major impact on those consumers who are seeking almost-current smartphones at lower prices. The...