Graylog is a log management system that is expanding into security monitoring. We look at the history of the company and speculate on its future development.
By Stephen Cooper
in Net Admin
on October 29, 2024
Looking to find out more about torrenting? We explain exactly what torrenting is, how to torrent safely, and what to do if you get caught.
By Paul Bischoff
in VPN & Privacy
on May 21, 2024
Access to your favorite online casino can be limited if you travel abroad. Using a VPN ensures that you can bypass geo-restrictions and still play. But which VPN to choose? We look at the options.
By Justin Schamotta
in VPN & Privacy
on July 19, 2023
Learn what a relay attack is, how it works, and how it can be prevented. By way of illustration, we will look at three examples of relay attacks. Car relay attacks, particularly, show the varied techniques criminals use to get into, and away with, your car.
By Penny Hoelscher
in Information Security
on August 3, 2023
If you find that ITSM isn’t relevant to your new cloud-based infrastructure, Cloud Service Management (CSM) may be the answer to your prayers.
By Stephen Cooper
in Net Admin
on February 25, 2025
We put McAfee Antivirus 2016 through its paces to see how it compares to other antivirus and online
By Richard Patterson
in Antivirus
on September 9, 2021
Businesses can use site-to-site VPNs to collaborate on work and share resources between offices. We discuss how site-to-site VPNs work plus reveal our top recommendations, and the alternatives.
By Paul Bischoff
in VPN & Privacy
on February 14, 2023
FortiSIEM from Fortinet is a system protection platform. This tool examines live transactions and logs records to detect intrusion and malicious activity.
By Stephen Cooper
in Net Admin
on March 5, 2025
Command and control attacks can be devastating to your organization. This post takes an in-depth look at command and control attacks and provides tips on how to defend against them.
By Marc Dahan
in Information Security
on September 25, 2023