Recent blog posts

Why Cybersecurity Career Paths Aren’t Linear
Joanne Morley 23/02/2026

Why Cybersecurity Career Paths Aren’t Linear

Many people enter cybersecurity looking for a clear, step-by-step career path, but the reality is far more flexible. This article explains why most cybersecurity careers develop through stages rather than titles, how specialisation and leadership really change the work you do, and how to choose your next step without guessing...

All posts

Google Casts a New Spell: Introducing Magik(a)
Renmarc Andrada 07/06/2024

Google Casts a New Spell: Introducing Magik(a)

How often do we witness the blend of innovation and generosity in the tech world? Google's latest contribution to the open-source community, Magika, serves as a fascinating case study in this regard.

Forwarding Windows Logs to Syslog using NXLog Tool
John Jonusauskas 29/05/2024

Forwarding Windows Logs to Syslog using NXLog Tool

NXLog is an open-source, multi-platform log management tool designed to collect, process, and forward log messages. It can gather logs from various sources across the network, including systems, applications, and devices.

Unveiling Intelligence through Honeypots' Cyber Deception
Luis Suastegui 10/05/2024

Unveiling Intelligence through Honeypots' Cyber Deception

Honeypots are intriguing tools in cybersecurity, designed to attract cyber attackers and analyze their methods. We explore the two main types, as well as the pros and cons of using them as part of your security strategy.