This is the ninth part of my syslog-ng tutorial. Last time, we learned about macros and templates. Today, we learn about syslog-ng filters. At the end of the session, we will see a more complex filter and a template function.
SSH launches OpenSSH support service for multi-platform SSH environments
Helsinki, Finland – June 6, 2023 – To resolve various customer support problems regarding OpenSSH implementations, SSH has launched a support service for OpenSSH. As a result, customers benefit from high-quality SSH support services also for the open-source variant of SSH software. OpenSSH will be supported on Windows and Red Hat Linux platforms. The SSH protocol is a secure network protocol used to establish encrypted and secure remote connections and transfer data between different systems.
Vietnam’s Personal Data Protection Decree effective from July: A Quick Guide
In April this year, Decree No. 13/2023/ND-CP – the first Vietnam data protection law – was issued, providing guidelines on personal data protection in the country. The Decree shall become effective from July 1st, 2023. Foreign investors should take note of these regulations.
Securing Trust with Securaze Geo-Location Solution
Do your customers request proof of where their devices have been erased? Do they want confirmation that their devices and confidential data have not left the country or ended up in the wrong hands? Are they looking for proof that all aspects of your contract have been fulfilled?
8 ways to secure your Active Directory environment
Taking the right steps to secure your Active Directory (AD) has never been more important. Because AD controls who can get into your network and what they can do once they’re inside, failure to implement proper controls will dramatically increase your risk of costly breaches and extended downtime.
Syslog-ng 101, part 8: Macros and templates
This is the eighth part of my syslog-ng tutorial. Last time, we learned about network logging. Today, we learn about syslog-ng macros and templates. At the end of the session, we will know how to do a simple log rotation using macros.
Summary of the Investigation Related to CVE-2023-0669
We’d like to provide an update on our investigation into the suspicious activity detected in our Fortra GoAnywhere MFT solution. Working with Unit 42, we have completed our investigation and have compiled a factual summary of the investigation, as well as continuous improvement actions Fortra is taking to further strengthen our systems and recommended actions customers can take to secure their data and improve their security posture using available features in the GoAnywhere MFT solution.
Syslog-ng 101, part 7: Networking
This is the seventh part of my syslog-ng tutorial. Last time, we learned about syslog-ng destinations and the log path. Today, we learn about syslog-ng network logging. At the end of the session, we will send test messages to a syslog-ng network source.
Security Awareness Training ROI: Part 2 Of 3
If you haven’t read Part 1 of our Security Awareness Training ROI, you can here. In it, we discussed the high-level overview of why security awareness training should be a vital part of any company’s cybersecurity strategy and how to get the best security awareness training ROI.
Open-Source SSH: When Free Is Not Free
Free software, also known as open-source software, sounds like a good way to cut already high IT costs. As the name suggests, it’s free, thus it shouldn’t cost anything. But is it really that simple? Let’s find out.
Syslog-ng 101, part 6: Destinations and log path
This is the sixth part of my syslog-ng tutorial. Last time, we learned about syslog-ng source definitions and how to check the syslog-ng version. Today, we learn about syslog-ng destinations and the log path. At the end of the session, we will also perform a quick syntax check.
Attackers keep trying, but NCSC’s CAF guidance will keep Active Directory protected
As an IT professional, it shouldn’t surprise you to know that there are 95 million attempted Active Directory (AD) attacks every day. But cyberattack concerns aren’t limited to on-premises Active Directory. In fact, last year, there were more than 25 billion attacks in Azure AD.
About Us
From hardware appliances to software solutions and training, DT Asia understands cybersecurity challenges and can deliver solutions that help detect & identify, protect & secure, authenticate & authorise, and degauss & destroy.
Contact Us
Address
#02-72 WCEGA Tower,
Singapore 658065