Nov 28, 2023 | Uncategorized
This is the 12th part of my syslog-ng tutorial. Last time, we learned about enriching log messages using syslog-ng. Today, we learn about how to send log messages to Elasticsearch. You can watch the video or read the text below. History of Elasticsearch support...
Nov 23, 2023 | Uncategorized
Microsoft 365 migrations can be complex. With so many vital business applications in use—like Teams, OneDrive, SharePoint and Outlook along with the sheer volume of data stored on each of these—there is a lot that can go wrong. I’ve had several discussions recently...
Nov 9, 2023 | Uncategorized
While the tech world was looking forward to the upcoming release of the iPhone 15 in September, an exciting development is taking place in the market which could have a major impact on those consumers who are seeking almost-current smartphones at lower prices. The...
Oct 25, 2023 | Articles, Articles, Articles, Articles
Phishing has been and continues to be one of the most common methods (TTPs) cyber attackers use because it is so effective. Phishing is a simple attack vector that enables cyber attackers to easily scale their attacks, customize for their intended targets, and bypass...