Phishing – It’s No Longer About Malware (or Even Email)

Phishing – It’s No Longer About Malware (or Even Email)

Phishing has been and continues to be one of the most common methods (TTPs) cyber attackers use because it is so effective. Phishing is a simple attack vector that enables cyber attackers to easily scale their attacks, customize for their intended targets, and bypass...
7 tenant-to-tenant migration planning tips

7 tenant-to-tenant migration planning tips

Tenant-to-tenant migrations are increasingly common. Some are necessitated by business changes like mergers, acquisitions, and divestitures, while others are driven by the desire to clean up or consolidate the IT infrastructure to facilitate business processes and...
Getting data to Splunk

Getting data to Splunk

Getting data to Splunk can be challenging. Syslog is still the most important data source, and it can provide you with hard-to-solve problems (for example, like high volume, non-compliant messages, unreliable network protocol (UDP), and more). The syslog-ng Premium...
Announcing the new SSB 4000 Appliance for Syslog-ng Store Box!

Announcing the new SSB 4000 Appliance for Syslog-ng Store Box!

Highly secure, ultra-reliable, and enterprise grade log management.   Key Specifications Processor – Intel Xeon Silver 4310T @ 2.30Ghz, 10 Core Memory – 64GB 3200Mhz ECC Useable Storage – 40TB RAID 6 – Broadcom 9560-8i RAID controller...