Dec 1, 2025 | Uncategorized
A feast of new features. A cornucopia of new capabilities. A banquet of breakthroughs (and the T-day puns are just getting started). Graylog 7.0 brings a full plate of advancements that help security teams cut through noise, control cloud costs, and respond with...
Nov 24, 2025 | Uncategorized
The shift to cloud computing has transformed the way enterprises build and scale their IT infrastructure. But with this transformation comes a new challenge: maintaining security and visibility across environments that span on-premise networks, public clouds, and...
Nov 17, 2025 | Articles, Articles, Articles, Articles
Data is now the lifeblood of every modern organization. Ensuring the right data is available to the right people at the right time has become a strategic imperative. At the same time, businesses are under pressure to reduce costs while still enabling growth,...
Nov 17, 2025 | Uncategorized
A recent phishing campaign has been identified using invisible characters to sneak past email security filters, according to Jan Kopriva from the SANS Internet Storm Center. The attackers insert soft hyphens into the subject line—specifically in the phrase “Your...