Apr 7, 2023 | Uncategorized
Today, data breaches and cyber-attacks are becoming so frequent that they aren’t a matter of “if” but “when,” making cybersecurity employee training a must. It’s no secret that security awareness training is essential for protecting your company from cyber-attacks....
Mar 28, 2023 | Uncategorized
Attack paths are at the forefront of cybersecurity discussions today. But exactly what is an attack path? Why is Active Directory (AD) particularly vulnerable? And what can you do to protect your organization? This blog post covers all these questions and more. ...
Mar 28, 2023 | Articles, Articles, Articles
This is the fifth part of my syslog-ng tutorial. Last time we had an overview of the syslog-ng configuration and had our first steps working with syslog-ng. Today we learn about syslog-ng source definitions and how to check the syslog-ng version and its enabled...