Start now

SOC

What is a Security Operations Center (SOC) and how does it work?

What is a Security Operations Center (SOC) and how does it work?

Despite the advancement of existing cybersecurity measures, criminal cyberattacks are still on the rise. In fact, the 2021 World Economic…

Endpoints: How to Protect from Security Threats

Endpoints: How to Protect from Security Threats

Endpoints are the cybersecurity "front line" against malware attacks. Learn best practices to keep your business safe and find out more about our EDR solution.

Building a safe teleworking environment

Building a safe teleworking environment

In this period, organizations face immense challenges in terms of business continuity. But it is also a great opportunity to build the perfect remote environment.

The rise of Emotet

The rise of Emotet

Emotet is a multipurpose malware which is mainly distributed through spam mails. It was first spotted in 2014 and was designed to steal bank account details.

4 steps to manage cybersecurity incidents

4 steps to manage cybersecurity incidents

We understand cybersecurity incidents as any event that can harm a system’s confidentiality, integrity or availability.

Basics- Linux Events Logging

Basics- Linux Events Logging

In this post we will cover the basics of Event Logging in Linux systems. We will talk about Syslog: Message structure, the most famous implementations and main configurations.