2022: A year of phishing with a solution to calm the seas

2022: A year of phishing with a solution to calm the seas

In 2022, phishing scams continued to hook into consumers and enterprise accounts. In fact, recent research from EMA revealed that 87% of surveyed businesses indicate that their organization experienced an identity-related security breach in the preceding 12 months....
syslog-ng 101, Part 2: Basic Concepts

syslog-ng 101, Part 2: Basic Concepts

Welcome to the second part of my syslog-ng tutorial series. In this part, we cover some of the basic concepts behind syslog-ng. You can watch the video or read the text below. Link: https://youtu.be/unXX69XUtnE What is syslog-ng? Last time we defined syslog-ng as an...
syslog-ng 101, Part 1: Introduction

syslog-ng 101, Part 1: Introduction

Welcome to the first part of my syslog-ng tutorial series. In this part, I give you a quick introduction what to expect from this series and try to define what syslog-ng is. Before introducing you to syslog-ng, let me introduce myself in a few words. I am Peter Czanik...