14 Best Practices For Firewall Network Security

14 Best Practices For Firewall Network Security

Back in the early days of corporate networking, IT departments typically deployed firewalls to keep employees from accessing non-work related content, like social media sites. While content filtering remains part of a firewall’s job, it’s no longer the primary reason...
Syslog-ng 101, part 11: Enriching log messages

Syslog-ng 101, part 11: Enriching log messages

This is the eleventh part of my syslog-ng tutorial. Last time, we learned about message parsing using syslog-ng. Today, we learn about enriching log messages. You can watch the video or read the text below. YouTube Link: https://youtu.be/tFHyvLgiSyI   Enriching...
Common cloud migration challenges and 7 steps to overcome them

Common cloud migration challenges and 7 steps to overcome them

Cloud migration challenges — capacity, throughput, performance and above all security — confront everyone in organizations from leaders and managers to users. Digital transformation has been well documented for many years but as a baseline, let’s define it as the...