Syslog-ng 101, part 7: Networking

Syslog-ng 101, part 7: Networking

This is the seventh part of my syslog-ng tutorial. Last time, we learned about syslog-ng destinations and the log path. Today, we learn about syslog-ng network logging. At the end of the session, we will send test messages to a syslog-ng network source. You can watch...
Security Awareness Training ROI: Part 2 Of 3

Security Awareness Training ROI: Part 2 Of 3

If you haven’t read Part 1 of our Security Awareness Training ROI, you can here. In it, we discussed the high-level overview of why security awareness training should be a vital part of any company’s cybersecurity strategy and how to get the best security awareness...
Open-Source SSH: When Free Is Not Free

Open-Source SSH: When Free Is Not Free

Free software, also known as open-source software, sounds like a good way to cut already high IT costs. As the name suggests, it’s free, thus it shouldn’t cost anything. But is it really that simple? Let’s find out. As pointed out by Free Software...
Active Directory Cyber Resiliency

Active Directory Cyber Resiliency

Reduce Cyber Risk for your organization In 2021, 25 billion attacks on Azure AD accounts were reported. Your organization Active Directory (AD) security sits as your organization’s cornerstone, but it’s also every cyber villain’s favorite target whom can control your...