White Paper: How to configure syslog-ng™ PE to cooperate with Splunk

White Paper: How to configure syslog-ng™ PE to cooperate with Splunk

Splunk is a popular search and analysis platform. Many users of Splunk also have syslog-ng™ deployed in their environments. This guideline describes scenarios in which Splunk users can benefit from syslog-ng™ Premium Edition features and offers some...
State of Global Enterprise Authentication Survey

State of Global Enterprise Authentication Survey

“…In Singapore, 65% of employees rely on username and password as a primary means of authentication – far exceeding the already-concerning global average of 59%…” To get a copy of the report, contact us here...
Security Awareness Training ROI: Part 1 Of 3

Security Awareness Training ROI: Part 1 Of 3

Today, data breaches and cyber-attacks are becoming so frequent that they aren’t a matter of “if” but “when,” making cybersecurity employee training a must. It’s no secret that security awareness training is essential for protecting your company from cyber-attacks....
SSH in the World of Post-Quantum Cryptography (PQC)

SSH in the World of Post-Quantum Cryptography (PQC)

Nowadays, advances in quantum computing are moving at a neck-breaking pace. Giants in the field have been faithfully executing roadmaps and delivering on milestones laid out several years ago. And while it is hard to predict when the advances will reach their breaking...