This is the fourth part of my syslog-ng tutorial. I hope that since the previous part of my tutorial, you successfully installed syslog-ng. In this part we will finally work with syslog-ng, not just learn about the theoretical background. We will do basic configuration and testing.
Making sense of the alphabet soup within authentication and modern MFA terminology
The vast majority of all cyberattacks start with stolen login passwords or other credentials. In a world that is moving to the cloud, our work, personal and government communication systems have become more accessible and vulnerable for anyone on the internet…
Know Your Vulnerabilities: Key Exchange in Danger
The quantum threat is around the corner. You already know that Post-Quantum Cryptography (PQC) is a cost-effective and practical solution. However, modern data communication cryptosystems used in network protocols like SSH and TLS are complicated and…
How to Recognize and Respond to Emerging Social Media Cybersecurity Threats
Facebook. Twitter. Instagram. LinkedIn. YouTube. Pinterest. Mastodon. The list goes on. Whether you love or loathe social media, these platforms have become integral to how we communicate as individuals and businesses. Cybercriminals have also taken note…
6 IT security predictions for 2023
As I do each year, I recently got together with a number of my very talented colleagues at Quest to think about key trends and lay out our IT predictions for the coming year. Since we specialize in Active Directory and cyber resilience, we were particularly interested in uncovering and exploring the latest trends related to those areas.
2022: A year of phishing with a solution to calm the seas
In 2022, phishing scams continued to hook into consumers and enterprise accounts. In fact, recent research from EMA revealed that 87% of surveyed businesses indicate that their organization experienced an identity-related security breach in the preceding 12 months. Many successes of the sophisticated phishing scams were due to legacy MFA implementations such as SMS, mobile auth, and OTP which aren’t phishing-resistant or equipped to stop these types of attacks.
syslog-ng 101, Part 2: Basic Concepts
Welcome to the second part of the syslog-ng tutorial series. In this part, we cover some of the basic concepts behind syslog-ng. You can watch the video or read the text below.
syslog-ng 101, Part 1: Introduction
Welcome to the first part of the syslog-ng tutorial series. This part gives you a quick introduction to what to expect from this series and tries to define what syslog-ng is.
syslog-ng 101: how to get started with learning syslog-ng?
How to get started with syslog-ng? There are two main resources: the syslog-ng documentation and the syslog-ng blogs. You should learn the concepts and basics from the documentation.
Insecure erasures with the risk of sensitive data remaining on the device or the recovery of this data?
Microsoft Windows. Everyone knows it, everyone has probably worked with it at some point.
While Microsoft and OEMs have good intentions, data sanitization isn’t their core competency. Additionally, they lack the necessary certifications and audit trails requisite to reassure users and organizations their data is truly unrecoverable.
You Don’t Need New Fiber Cables to Be Quantum-Safe
You might already know a lot about the quantum threat, or you might just have heard of it. You might know that there are remedies that would make you quantum-safe. However, you might not know that there is a wide variety of alternatives. Which one is the right one for your organization? Let’s find out.
Hello, Quantum-Safe World!
Quantum computers are no longer science fiction. Their computation power is increasing by leaps and bounds both in terms of the number of usable qubits and optimization in error correction. The recent advances and heavy investment only accelerate the progress.
About Us
From hardware appliances to software solutions and training, DT Asia understands cybersecurity challenges and can deliver solutions that help detect & identify, protect & secure, authenticate & authorise, and degauss & destroy.
Contact Us
Address
#02-72 WCEGA Tower,
Singapore 658065