Recent blog posts

Securing Our World: Celebrating Cybersecurity Awareness Month With SBT
Duncan Whitley 15/10/2024

Securing Our World: Celebrating Cybersecurity Awareness Month With SBT

It's currently Cybersecurity Awareness Month, which gives us a great opportunity to reflect on how fundamental cybersecurity has become in today's world. This year, the theme is "Secure Our World," which perfectly captures the growing urgency for individuals and organizations to take action to protect their digital environments. In this...

Cloud Security: A Defender's Perspective
Aditya Rai 16/10/2024

Cloud Security: A Defender's Perspective

Cloud security involves a broad set of policies, technologies, applications, and controls utilized to protect virtualized IP, data, applications, services, and the associated infrastructure of cloud computing.

All posts

Google Casts a New Spell: Introducing Magik(a)
Renmarc Andrada 07/06/2024

Google Casts a New Spell: Introducing Magik(a)

How often do we witness the blend of innovation and generosity in the tech world? Google's latest contribution to the open-source community, Magika, serves as a fascinating case study in this regard.

Forwarding Windows Logs to Syslog using NXLog Tool
John Jonusauskas 29/05/2024

Forwarding Windows Logs to Syslog using NXLog Tool

NXLog is an open-source, multi-platform log management tool designed to collect, process, and forward log messages. It can gather logs from various sources across the network, including systems, applications, and devices.

Unveiling Intelligence through Honeypots' Cyber Deception
Luis Suastegui 10/05/2024

Unveiling Intelligence through Honeypots' Cyber Deception

Honeypots are intriguing tools in cybersecurity, designed to attract cyber attackers and analyze their methods. We explore the two main types, as well as the pros and cons of using them as part of your security strategy.