syslog-ng 101, Part 4: Configuration and testing

syslog-ng 101, Part 4: Configuration and testing

This is the fourth part of my syslog-ng tutorial. I hope that since the previous part of my tutorial, you successfully installed syslog-ng. In this part we will finally work with syslog-ng, not just learn about the theoretical background. We will do basic configuration and testing.

6 IT security predictions for 2023

6 IT security predictions for 2023

As I do each year, I recently got together with a number of my very talented colleagues at Quest to think about key trends and lay out our IT predictions for the coming year. Since we specialize in Active Directory and cyber resilience, we were particularly interested in uncovering and exploring the latest trends related to those areas.

2022: A year of phishing with a solution to calm the seas

2022: A year of phishing with a solution to calm the seas

In 2022, phishing scams continued to hook into consumers and enterprise accounts. In fact, recent research from EMA revealed that 87% of surveyed businesses indicate that their organization experienced an identity-related security breach in the preceding 12 months. Many successes of the sophisticated phishing scams were due to legacy MFA implementations such as SMS, mobile auth, and OTP which aren’t phishing-resistant or equipped to stop these types of attacks.

syslog-ng 101, Part 2: Basic Concepts

syslog-ng 101, Part 2: Basic Concepts

Welcome to the second part of the syslog-ng tutorial series. In this part, we cover some of the basic concepts behind syslog-ng. You can watch the video or read the text below.

syslog-ng 101, Part 1: Introduction

syslog-ng 101, Part 1: Introduction

Welcome to the first part of the syslog-ng tutorial series. This part gives you a quick introduction to what to expect from this series and tries to define what syslog-ng is.

You Don’t Need New Fiber Cables to Be Quantum-Safe

You Don’t Need New Fiber Cables to Be Quantum-Safe

You might already know a lot about the quantum threat, or you might just have heard of it. You might know that there are remedies that would make you quantum-safe. However, you might not know that there is a wide variety of alternatives. Which one is the right one for your organization? Let’s find out.

Hello, Quantum-Safe World!

Hello, Quantum-Safe World!

Quantum computers are no longer science fiction. Their computation power is increasing by leaps and bounds both in terms of the number of usable qubits and optimization in error correction. The recent advances and heavy investment only accelerate the progress.  

About Us

From hardware appliances to software solutions and training, DT Asia understands cybersecurity challenges and can deliver solutions that help detect & identify, protect & secure, authenticate & authorise, and degauss & destroy.

Contact Us

Address

21 Bukit Batok Crescent,
#02-72 WCEGA Tower,
Singapore 658065

Phone

+65 6266 2877