Security Awareness Training ROI: Part 1 Of 3

Security Awareness Training ROI: Part 1 Of 3

Today, data breaches and cyber-attacks are becoming so frequent that they aren’t a matter of “if” but “when,” making cybersecurity employee training a must. It’s no secret that security awareness training is essential for protecting your company from cyber-attacks....
SSH in the World of Post-Quantum Cryptography (PQC)

SSH in the World of Post-Quantum Cryptography (PQC)

Nowadays, advances in quantum computing are moving at a neck-breaking pace. Giants in the field have been faithfully executing roadmaps and delivering on milestones laid out several years ago. And while it is hard to predict when the advances will reach their breaking...
Yubico Channel Awards 2022

Yubico Channel Awards 2022

Quote from Yubico: ‘‘Congratulations on the award! Thank you for your partnership over the last several years, we are looking forward to many more joint successes!” “Congratulations Team DTA! It is our pleasure working and growing with your...
Understanding attack paths targeting Active Directory

Understanding attack paths targeting Active Directory

Attack paths are at the forefront of cybersecurity discussions today. But exactly what is an attack path? Why is Active Directory (AD) particularly vulnerable? And what can you do to protect your organization? This blog post covers all these questions and more.  ...
Syslog-ng 101, part 5: Sources

Syslog-ng 101, part 5: Sources

This is the fifth part of my syslog-ng tutorial. Last time we had an overview of the syslog-ng configuration and had our first steps working with syslog-ng. Today we learn about syslog-ng source definitions and how to check the syslog-ng version and its enabled...