Some people talk about security, many people skimp on security, few do security right. Of course, security has many meanings, but in this post I will be discussing physical and online security of data. With the amount of data available today, it is critical that we all take security seriously. In this post, I would like to talk about some of the security issues I have had in the past and a few of my approaches to ensure better security of my data. Read on to learn more!
Now that the evolution of topologies and high availability with Log Insight is known, I would like to cover greenfield and brownfield deployments as well as security considerations. Read on to learn more!
The topic of reference architectures keeps coming up with Log Insight so I thought I would cover it over a series of blog posts. In this post, I will start with the basic concepts.
I have talked about Log Insight user alerts in the past, but I think it is important to re-enforce the user alert architecture as it may be a little different than you think. What I want to focus on in this post is how user alerts are triggered within Log Insight. Read on to learn more!
As many of you know, I recently purchased a new home. Given the opportunity, it was a good time to revisit the home lab. In this post, I would like to talk about the changes and the final result.