May 9, 2023

BROP attacks - What is it and how to defend yourself?

May 2, 2023

CISO starter pack - Security Policy

April 3, 2023

CISO starter pack - Log collection fundamentals

November 22, 2022

The EU's response to cyberwarfare

November 8, 2022

Looking beyond Cybersecurity Awareness Month

August 10, 2022

NXLog in an industrial control security context

August 3, 2022

Send email alerts from NXLog using Python, Perl, or Ruby

June 28, 2022

Security logging on Windows - beyond 4625

March 3, 2022

Cyberattacks on the power grid - are you prepared?

February 3, 2022

How to prevent and detect Log4j vulnerabilities

October 11, 2021

Collecting DHCP server logs on Windows

September 6, 2021

Collecting Kubernetes logs with NXLog

August 25, 2021

File-based logs? Yes, they’re still being used!

July 15, 2021

Top 5 Windows Security logs everyone should collect

July 1, 2021

Top 5 security concerns revealed with DNS logging

January 13, 2021

NXLog Containers were certified by Red Hat

May 31, 2020

DNS Log Collection - Part 1

May 28, 2020

DNS Log Collection - Part 2

May 14, 2020

DNS Log Collection - Part 3

February 3, 2020

Insufficient logging and monitoring, TOP 10 security risk

January 24, 2020

What is File Integrity Monitoring (FIM)? Why do you need it?