Blog

Not What It SIEMs. How SMEs Can Unlock the Power of Logs Without a SOC

Almost every single computing device, laptop, desktop, router, firewall, keeps a record of things that have changed over time. Borrowing from maritime parlance, we call these “logs”. Logs are ledgers of changes in state, recorded and stored in sequence, and can tell you a lot about what that computing device has been doing, why it has been doing it, and when.

more →

Blog

Is Your Online Business Vulnerable to Bad Bots?

An ever-increasing amount of internet traffic is generated by non-human users. Increasingly, websites are facing large volumes of traffic caused by automated scripts, or bots. According to ‘Bad Bot Report 2019’ in 2018 37.9% of all internet traffic wasn’t human. All this traffic can be a significant drain on available bandwidth for websites, and cause issues for real customers trying to access your site.

more →