Securing your Metasploit Logs

Metasploit, backed by a community of 200,000 users and contributors is the most impactful penetration testing solution on the planet. With it, uncover weaknesses in your defenses, focus on the highest risks, and improve your security outcomes. Your Metasploit Pro… Read More

Analyzing ELB Log Data

Thanks to some slick work from our engineering team, we have recently released a lightweight python script that will allow you to pull your Elastic Load Balancer logs from S3 into Logentries. In this implementation, we use AWS Lambda and… Read More

Using Logs for Security & Compliance: Part 3

security-white-paper-part-3

This 3-part series explores the critical role logs play in maintaining regulatory compliances and provides specific examples of known events to look for an how to evaluate different compliance tools. To download the free 24-page white paper, click here.

When… Read More

Posted in Uncategorized

Considering the Explosive Growth of Log Analytics

considering-the-explosive-growth-of-log-analytics

You’d have to be living in a cave to not know that the practice of log analytics in corporate IT has grown dramatically in the last 10 years. This explosion in logging activities over the recent years is due to… Read More

Tagged with: , ,
Posted in Log Management, Logentries

Video: Logs for PCI Compliance

security-feature-hero

PCI DSS provides some specific requirements for how logs should be collected, reviewed and retained to maintain compliance. In Rapid7’s latest “Whiteboard Wednesday” video, I review three areas of PCI requirements for log management, including:

Why logs need to be… Read More

Tagged with: , , ,
Posted in Security

Using Logs for Security & Compliance: Part 2

security-white-paper-part-2

This 3-part series explores the critical role logs play in maintaining regulatory compliances and provides specific examples of known events to look for an how to evaluate different compliance tools. To download the free 24-page white paper, click here.

For… Read More

Tagged with: , , ,
Posted in Security

Combining AngularJS and ReactJS for better applications

combining-angularJS-and-reactJS-for-better-applications

If you’re a JavaScript developer, and know a little bit about the current state of JS development, then you’re probably well aware that there seems to be a new JS framework popping up every day. It’s easy to feel overwhelmed… Read More

Posted in Angular, How To, JavaScript, React

Monitoring Business Critical Events Webinar with VictorOps

monitoring-business-critical-events-webinar-with-victorOps

How the most important metrics aren’t being monitored nearly enough
Many of today’s organizations have an established strategy for monitoring their IT environments for issues with performance, security and resource utilization. In many cases, performance is monitored and issues are… Read More

Posted in Webinar

January Webinar Recap: 2016 Best Logging Practices

jan-2016-webinar-recap

In our January webinar, broadcasted & recorded on January 28th 2016, we shared 5 best practices for log management & analytics in 2016 that were inspired by the most common questions we received in 2015.
Below is a brief summary… Read More

Posted in How To, Webinar

Securing your Metasploit Logs

securing-your-metasploit-logs

Metasploit, backed by a community of 200,000 users and contributors is the most impactful penetration testing solution on the planet. With it, uncover weaknesses in your defenses, focus on the highest risks, and improve your security outcomes.
Your Metasploit Pro… Read More

Posted in Feature, How To, Security

Using Logs for Security & Compliance: Part 1

security-white-paper

This 3-part series explores the critical role logs play in maintaining regulatory compliances and provides specific examples of known events to look for an how to evaluate different compliance tools. To download the free 24-page white paper, click here.

For… Read More

Posted in Security

Subscribe to the Blog

Categories

Archives