Blog Archives

Using Log Data as Forensic Evidence

Working with computer logs is something of an ongoing adventure in discovery. The data from such logs is amenable to many uses and applications, particularly when it comes to monitoring and maintaining security. But even after a security breach or… Read More

Tagged with: , ,
Posted in Log Analysis, Log Management, Monitoring, PCI, Security

Using Event and Log Data to Assure Security and Compliance

All the way back in 2007, security industry analyst and expert Dr. Larry Ponemon of the eponymous institute wrote for Network World that “data breaches are a pervasive problem for most organizations in the United States today.” Nobody is prepared… Read More

Tagged with: , ,
Posted in Log Analysis, Log Management, Monitoring, PCI, Security, Server monitoring

Subscribe to the Blog

Categories

Archives