Welcome to the second part of the syslog-ng tutorial series. In this part, we cover some of the basic concepts behind syslog-ng. You can watch the video or read the text below.
Welcome to the first part of the syslog-ng tutorial series. This part gives you a quick introduction to what to expect from this series and tries to define what syslog-ng is.
How to get started with syslog-ng? There are two main resources: the syslog-ng documentation and the syslog-ng blogs. You should learn the concepts and basics from the documentation.
Insecure erasures with the risk of sensitive data remaining on the device or the recovery of this data?
Microsoft Windows. Everyone knows it, everyone has probably worked with it at some point.
While Microsoft and OEMs have good intentions, data sanitization isn’t their core competency. Additionally, they lack the necessary certifications and audit trails requisite to reassure users and organizations their data is truly unrecoverable.
You might already know a lot about the quantum threat, or you might just have heard of it. You might know that there are remedies that would make you quantum-safe. However, you might not know that there is a wide variety of alternatives. Which one is the right one for your organization? Let’s find out.
Quantum computers are no longer science fiction. Their computation power is increasing by leaps and bounds both in terms of the number of usable qubits and optimization in error correction. The recent advances and heavy investment only accelerate the progress.
The digital world is constantly evolving, and so are the hackers who inhabit it. As technology advances, so do the methods and tools used by those with malicious intent. Currently, about 30,000 websites are hacked each day.
One of the most popular applications to feed Splunk with syslog messages is syslog-ng. However not everyone is happy to work on the command line anymore. This is where syslog-ng store box (SSB), an appliance built around syslog-ng, can help
“When you move your business to the cloud, it is important to ensure your information security. Information security management is based on trust, and it is a good idea to remember the old saying ‘Don’t put all your eggs in one basket’,” says Miikka Sainio
When we look at Zero Trust, it helps to take a step back. The internet is flooded with articles, hot takes, and it’s all too easy to get caught up in the hype. We run the risk of going too fast and missing important fundamentals
In 2021 the FBI’s Internet Crime Complaint Center (IC3) fielded a record 847,376 reported complaints – a 7 percent increase from 2020. Potential losses exceeded $6.9 billion.
At the time of writing, much of Europe and the U.S. is in the midst of a major heatwave, delivering record temperatures and concerns about climate change. Just as the heat is rising, so is the threat of cyberattacks.
From hardware appliances to software solutions and training, DT Asia understands cybersecurity challenges and can deliver solutions that help detect & identify, protect & secure, authenticate & authorise, and degauss & destroy.
#02-72 WCEGA Tower,