Understanding attack paths targeting Active Directory

Understanding attack paths targeting Active Directory

Attack paths are at the forefront of cybersecurity discussions today. But exactly what is an attack path? Why is Active Directory (AD) particularly vulnerable? And what can you do to protect your organization? This blog post covers all these questions and more.  ...
Syslog-ng 101, part 5: Sources

Syslog-ng 101, part 5: Sources

This is the fifth part of my syslog-ng tutorial. Last time we had an overview of the syslog-ng configuration and had our first steps working with syslog-ng. Today we learn about syslog-ng source definitions and how to check the syslog-ng version and its enabled...
Building strong partnerships in Bangkok together with SSH

Building strong partnerships in Bangkok together with SSH

Quote from SSH: ”🔑Active collaboration is the key. And we are always excited to meet with our partners and plan what the future holds for us together. 💪 DT Asia Pte Ltd is one of our biggest partners and distributors in the APAC...