Syslog-ng 101, part 11: Enriching log messages

Syslog-ng 101, part 11: Enriching log messages

This is the eleventh part of my syslog-ng tutorial. Last time, we learned about message parsing using syslog-ng. Today, we learn about enriching log messages. You can watch the video or read the text below. YouTube Link: https://youtu.be/tFHyvLgiSyI   Enriching...
Common cloud migration challenges and 7 steps to overcome them

Common cloud migration challenges and 7 steps to overcome them

Cloud migration challenges — capacity, throughput, performance and above all security — confront everyone in organizations from leaders and managers to users. Digital transformation has been well documented for many years but as a baseline, let’s define it as the...
How a Remote Workforce Impacts Your Data Security

How a Remote Workforce Impacts Your Data Security

You did it. Many months ago, you sent your employees home armed with their laptops, a few passwords, and a couple of Zoom invites. Now, hunkered down in their stretchy, comfy clothes, thankful for not having to commute, they’re carrying on the day-to-day business...
Future-Proofing Communications Security – SSH launches Zero Trust Suite

Future-Proofing Communications Security – SSH launches Zero Trust Suite

Helsinki, Finland – June 15, 2023 – SSH Communications Security launches SSH Zero Trust Suite, combining SSH’s proven-in-use communications security products into a modern passwordless, keyless, and borderless ecosystem solution and further fortifying solution...