The most common cyber resilience frameworks to know

The most common cyber resilience frameworks to know

Cyber resilience frameworks can help your organization achieve a vital goal: ensuring you can prepare for, withstand, recover from and evolve to better adapt to cyberattacks and other threats to your IT systems that can disrupt your business, or even bring it to a...
Syslog-ng 101, part 9: Filters

Syslog-ng 101, part 9: Filters

This is the ninth part of my syslog-ng tutorial. Last time, we learned about macros and templates. Today, we learn about syslog-ng filters. At the end of the session, we will see a more complex filter and a template function. You can watch the video or read the text...
SSH launches OpenSSH support service for multi-platform SSH environments

SSH launches OpenSSH support service for multi-platform SSH environments

Helsinki, Finland – June 6, 2023 – To resolve various customer support problems regarding OpenSSH implementations, SSH has launched a support service for OpenSSH. As a result, customers benefit from high-quality SSH support services also for the open-source...
Securing Trust with Securaze Geo-Location Solution

Securing Trust with Securaze Geo-Location Solution

Do your customers request proof of where their devices have been erased? Do they want confirmation that their devices and confidential data have not left the country or ended up in the wrong hands? Are they looking for proof that all aspects of your contract have been...