6 IT security predictions for 2023

6 IT security predictions for 2023

As I do each year, I recently got together with a number of my very talented colleagues at Quest to think about key trends and lay out our IT predictions for the coming year. Since we specialize in Active Directory and cyber resilience, we were particularly interested...
2022: A year of phishing with a solution to calm the seas

2022: A year of phishing with a solution to calm the seas

In 2022, phishing scams continued to hook into consumers and enterprise accounts. In fact, recent research from EMA revealed that 87% of surveyed businesses indicate that their organization experienced an identity-related security breach in the preceding 12 months....
syslog-ng 101, Part 2: Basic Concepts

syslog-ng 101, Part 2: Basic Concepts

Welcome to the second part of my syslog-ng tutorial series. In this part, we cover some of the basic concepts behind syslog-ng. You can watch the video or read the text below. Link: https://youtu.be/unXX69XUtnE What is syslog-ng? Last time we defined syslog-ng as an...
syslog-ng 101, Part 1: Introduction

syslog-ng 101, Part 1: Introduction

Welcome to the first part of my syslog-ng tutorial series. In this part, I give you a quick introduction what to expect from this series and try to define what syslog-ng is. Before introducing you to syslog-ng, let me introduce myself in a few words. I am Peter Czanik...