Can you forward Windows Event logs to Syslog? Yes, you can. We will show you how.
By Stephen Cooper
in Net Admin
on September 21, 2023
Phishing scams are common place, here's how to recognize and avoid them.
By Dave Albaugh
in Information Security
on May 13, 2022
In this article we’re going to provide you with a SOX compliance checklist to make sure you’re in sync with current requirements.
By Tim Keary
in Data Privacy Management
on August 29, 2023
By Paul Bischoff
in Information Security
on November 14, 2019
QRadar SIEM was developed by Q1 Labs, which is now owned by IBM. Now that it is the IBM SIEM, has the performance of QRadar SIEM improved? How does this tool compare to other SIEM systems?
By Stephen Cooper
in Net Admin
on June 21, 2023
Web browsers enable us to access all kinds of content. Because of that, they're a tempting target for hackers. We look at the top six web browser vulnerabilities and what you can do to avoid them.
By Marc Dahan
in Information Security
on October 19, 2023
Mac malware is rising, posing new threats for users. Due to the increasing sophistication of Mac cyberattacks, macOS users need to safeguard their devices. Discover the latest Mac malware trends.
By Ray Walsh
in VPN & Privacy
on May 20, 2024
You can set up a lot of new user accounts in Active Directory with commonly available tools.
By Stephen Cooper
in Net Admin
on November 30, 2024
Ransomware gangs aren't letting up. Here's a roundup of the biggest ransomware attacks from the past week.
By Paul Bischoff
in News
on June 8, 2024