Blog Archives

Network Administrator’s Guide to Surviving an Audit: During the Audit

Last time we talked about how to prepare for an audit. In this installment we’ll cover what to do once the audit begins. Let’s assume that you’re pretty well prepared. You’ve done your homework and know pretty much what to… Read More

Tagged with: ,
Posted in Security

Network Administrator’s Guide to Surviving an Audit: Preparation

Sooner or later, your organization will likely be the subject of an IT audit. But as ominous as that sounds, it doesn’t have to be something to dread. If you’re a network administrator, you’ll have a specific role in an… Read More

Tagged with: ,
Posted in PCI, Security

Logs To Understand User Activity and Behavior

Logging user activity is a great way to understand what users are doing, and how they are using network and computing resources. Collecting data from the standpoint of a user identity or login is a great way to correlate all… Read More

Tagged with: , , ,
Posted in Log Analysis, Security

Backup Log Checks and What They Can Tell You

There is simply no substitute for a recent, accurate backup when it comes to recovering from file or system damage or outages. But that backup must be complete and error-free to make a full recovery possible. That’s why inspecting log… Read More

Tagged with: , , , ,
Posted in Application Performance Monitoring, DevOps, Linux, Log Analysis, Monitoring, Server monitoring, Windows

Troubleshooting with Nexpose Logs

Nexpose is the industry standard in Vulnerability Management, giving you the confidence you need to understand your ever-changing attack surface, focus on what matters, and create better security outcomes.… Read More

Tagged with: , , , ,
Posted in How To, Log Analysis

Video: Logs for PCI Compliance

PCI DSS provides some specific requirements for how logs should be collected, reviewed and retained to maintain compliance. In Rapid7’s latest “Whiteboard Wednesday” video, I review three areas of PCI requirements for log management, including:

Why logs need to be… Read More

Tagged with: , , ,
Posted in Security

Using Logs for Security & Compliance: Part 2

This 3-part series explores the critical role logs play in maintaining regulatory compliances and provides specific examples of known events to look for an how to evaluate different compliance tools. To download the free 24-page white paper, click here.

For… Read More

Tagged with: , , ,
Posted in Security

Subscribe to the Blog

Categories

Archives