Phishing – It’s No Longer About Malware (or Even Email)

Phishing – It’s No Longer About Malware (or Even Email)

Phishing has been and continues to be one of the most common methods (TTPs) cyber attackers use because it is so effective. Phishing is a simple attack vector that enables cyber attackers to easily scale their attacks, customize for their intended targets, and bypass...
7 tenant-to-tenant migration planning tips

7 tenant-to-tenant migration planning tips

Tenant-to-tenant migrations are increasingly common. Some are necessitated by business changes like mergers, acquisitions, and divestitures, while others are driven by the desire to clean up or consolidate the IT infrastructure to facilitate business processes and...
Getting data to Splunk

Getting data to Splunk

Getting data to Splunk can be challenging. Syslog is still the most important data source, and it can provide you with hard-to-solve problems (for example, like high volume, non-compliant messages, unreliable network protocol (UDP), and more). The syslog-ng Premium...