Dec 28, 2022 | Uncategorized
In 2022, phishing scams continued to hook into consumers and enterprise accounts. In fact, recent research from EMA revealed that 87% of surveyed businesses indicate that their organization experienced an identity-related security breach in the preceding 12 months....
Dec 20, 2022 | Articles, Articles, Articles
Welcome to the first part of my syslog-ng tutorial series. In this part, I give you a quick introduction what to expect from this series and try to define what syslog-ng is. Before introducing you to syslog-ng, let me introduce myself in a few words. I am Peter Czanik...
Dec 9, 2022 | Uncategorized
Microsoft Windows. Everyone knows it, everyone has probably worked with it at some point. While Microsoft and OEMs have good intentions, data sanitization isn’t their core competency. Additionally, they lack the necessary certifications and audit trails requisite to...