Sep 13, 2023 | Uncategorized
Helsinki, Finland – September 7, 2023 – SSH Communications Security extends SSH Zero Trust Suite to a modern, real-time, secure, and audited (who did what when?) human-to-human communications platform. It consists of multiple modules helping people to share private...
Aug 3, 2023 | Uncategorized
Back in the early days of corporate networking, IT departments typically deployed firewalls to keep employees from accessing non-work related content, like social media sites. While content filtering remains part of a firewall’s job, it’s no longer the primary reason...
Aug 2, 2023 | Uncategorized
This is the eleventh part of my syslog-ng tutorial. Last time, we learned about message parsing using syslog-ng. Today, we learn about enriching log messages. You can watch the video or read the text below. YouTube Link: https://youtu.be/tFHyvLgiSyI Enriching...
Aug 2, 2023 | Articles, Articles, Articles, Articles
Cloud migration challenges — capacity, throughput, performance and above all security — confront everyone in organizations from leaders and managers to users. Digital transformation has been well documented for many years but as a baseline, let’s define it as the...