In this review, we’ll dive into the different types of problems Graylog can solve, as well as the two different types of log management products Graylog offers to its customers.
Cybersecurity job growth is exploding so if you've always wanted to work in cybersecurity, now is the time to start looking. Explore the market, learn who's hiring, and determine the path you need to land your first cybersecurity job.
Comparitech researchers have uncovered five critical cybersecurity flaws in Western Digital network-attached storage (NAS) devices. The vulnerabilities found affect tens of thousands of Western Digital My Cloud NAS devices globally.
The Venona files provide a rare glimpse into the world of high stakes spycraft. In this post, we discuss some key elements that enabled the Americans to break the Soviet code.
Rooting your Android phone enables you to do some cool things with your phone you couldn't otherwise do. But what is rooting? How does it work? And what are the risks associated with rooting your Android phone?
The latest attempt by the U.S. government to undermine encryption is a piece of legislation called the EARN IT act. In this post, we break it down and discuss how it could affect privacy, free speech and encryption.
It’s no secret that human error represents a weak link when it comes to cybersecurity. Find out exactly how serious an issue we face when it comes to everyday mistakes.