Security intelligence analytics: Planning Increases ROI

Security intelligence analytics: Planning Increases ROI

It has been a demanding week following the latest Board of Directors meeting, where senior leadership assigned you the task of finding a suitable security analytics solution. Over the past month, you collaborated with leadership to outline basic use cases aimed at...
‘Tis the season (SMeaSon?) for Smishing

‘Tis the season (SMeaSon?) for Smishing

    If you’re like most people with a personal device, you’ve probably noticed a notable increase in the volume of SMS messages, many of which are irrelevant to your daily life. Occasionally, these may be due to innocent errors or “fat...
Sending logs to Splunk using syslog-ng

Sending logs to Splunk using syslog-ng

  Choosing how to collect and forward log messages to Splunk using syslog-ng involves understanding the evolution of support for Splunk within syslog-ng, as well as weighing the pros and cons of different solutions, both open-source and commercial.   History...