Dec 1, 2025 | Articles, Articles, Articles, Articles
A feast of new features. A cornucopia of new capabilities. A banquet of breakthroughs (and the T-day puns are just getting started). Graylog 7.0 brings a full plate of advancements that help security teams cut through noise, control cloud costs, and respond with...
Nov 24, 2025 | Uncategorized
The shift to cloud computing has transformed the way enterprises build and scale their IT infrastructure. But with this transformation comes a new challenge: maintaining security and visibility across environments that span on-premise networks, public clouds, and...
Nov 17, 2025 | Uncategorized
A recent phishing campaign has been identified using invisible characters to sneak past email security filters, according to Jan Kopriva from the SANS Internet Storm Center. The attackers insert soft hyphens into the subject line—specifically in the phrase “Your...
Nov 4, 2025 | Uncategorized
Passwords continue to be one of the biggest drivers behind identity theft and security breaches. To reduce this risk, organizations are shifting towards passwordless authentication. FIDO2 security keys provide phishing-resistant, passwordless authentication to protect...