deployment | telemetry data pipeline
Understanding telemetry pipelines
security | announcement
The CrowdStrike incident and how the NXLog agent operates
nis2 | compliance
NIS2 Directive: a strong request for better incident handling
security | microsoft nps | radius
Onboarding Microsoft NPS logs
encryption | TPM | compliance | encryption
Harnessing TPM encryption with NXLog
edge case | submarine
NXLog Enterprise Edition on Submarines
SCADA | critical infrastructure
Digital substations and log collection
aviation security | ANSP | e-Enabled aircraft
The cybersecurity challenges of modern aviation systems
regulations | HIPAA
Meeting HIPAA Compliance with NXLog
sigma | threat detection
Detect threats using NXLog and Sigma
regulations | HIPAA | USA
HIPAA compliance logging requirements
Cybersecurity | SCADA | OT | IIoT
Industrial cybersecurity - The facts
security | BROP | Blind Return-Oriented Programming
BROP attacks - What is it and how to defend yourself?
CISO starter pack
CISO starter pack - Security Policy
CISO starter pack
CISO starter pack - Log collection fundamentals
cyberwarfare | European Union | cyberweapon
The EU's response to cyberwarfare
cybersecurity awareness month | awareness
Looking beyond Cybersecurity Awareness Month
security | ics
NXLog in an industrial control security context
python | perl | ruby | alerts
Send email alerts from NXLog using Python, Perl, or Ruby
security logging | windows logs | log collection
Security logging on Windows - beyond 4625
cyberattacks | cybersecurity
Cyberattacks on the power grid - are you prepared?
cybersecurity | log4j
How to prevent and detect Log4j vulnerabilities
log collection | dhcp server | audit log | windows event log | etw
Collecting DHCP server logs on Windows
kubernetes | log collection | container | kubernetes logs | integration
Collecting Kubernetes logs with NXLog
log file | log collection
File-based logs? Yes, they’re still being used!
windows logs | security logs | windows | log collection
Top 5 Windows Security logs everyone should collect
it security | cybersecurity | dns | dns logs
Top 5 security concerns revealed with DNS logging
linux | red hat | containers
NXLog Containers were certified by Red Hat
log collection | dns | dns logs
DNS Log Collection and Parsing
log collection | dns logs | windows dns logs | dns | windows
DNS Log Collection on Windows
log collection | dns | dns logs | linux dns logs | bind dns logs | linux
DNS Log Collection on Linux
security risk | it security | cybersecurity
Insufficient logging and monitoring, TOP 10 security risk
fim | log collection