Blog Archives

Logs To Understand User Activity and Behavior

Logging user activity is a great way to understand what users are doing, and how they are using network and computing resources. Collecting data from the standpoint of a user identity or login is a great way to correlate all… Read More

Tagged with: , , ,
Posted in Log Analysis, Security

Widely-used Android App Leaks MS Exchange Credentials

In October, Rapid7 researchers uncovered a significant vulnerability in the Nine mobile application for Android. Baldly stated, this app leaks Microsoft Exchange user credentials, plus mail envelopes and attachments, mailbox synchronization data, caleandar entries and tasks to attackers. It has… Read More

Tagged with: , ,
Posted in Log Analysis, Log Management, Logentries, Monitoring, Security

Using Event and Log Data to Assure Security and Compliance

All the way back in 2007, security industry analyst and expert Dr. Larry Ponemon of the eponymous institute wrote for Network World that “data breaches are a pervasive problem for most organizations in the United States today.” Nobody is prepared… Read More

Tagged with: , ,
Posted in Log Analysis, Log Management, Monitoring, PCI, Security, Server monitoring

4 Potential Security Issues Raised By Pokémon Go

Pokémon Go is a phenomenon. The game is objectively a success and has been breaking mobile gaming records almost weekly. The game’s current success is without being open in some significant markets and it shows no signs of slowing. It… Read More

Tagged with: , , ,
Posted in DevOps, Security

How Audit Logs Help Confirm and Correct Security Policy

There are many possible definitions for the term “security policy,” but all of them share certain elements in common. A security policy should lay out what assets, both physical and digital, an organization wishes to protect. It should explain what… Read More

Tagged with: , , , ,
Posted in Log Analysis, Log Management, Security

SSH from the ground up

If you work professionally in the IT industry, chances are you’ve been using OpenSSH for a long time now for your day to day work.
OpenSSH however provides so much more than “just” remote shell on *nix system (and apparently… Read More

Tagged with: ,
Posted in DevOps, How To, Security

Checking Active Directory (AD) Security and Integrity via Log Monitoring

Because AD literally holds the keys to the kingdom for domain-based networks and runtime environments, it’s usually a good idea to keep a close eye on those keys, how they’re being used and what kinds of attacks might be directed… Read More

Tagged with: , ,
Posted in Agent, Log Management, Monitoring, Server monitoring, Windows

15 Events to Log for Better DevOps

DevOps practices are now finding their way into more and more organizations. Up to now, as the DevOps movement has started to percolate across various industries the focus has been on improving the IT department. In Logentries’ article 15 Events… Read More

Tagged with: , , , , , , , ,
Posted in .Net, Alerts, Application Performance Monitoring, Business Metrics, Data visualization, DevOps, Feature, Java, JavaScript, LEQL, Log Analysis, Log Management, Node.js, Security, Server monitoring, Tableau, Tips & Tricks

Infographic: What scares IT Professionals most about IT Infrastructure

Logentries surveyed IT Professionals identifying themselves as members of Information Technology Teams, Operations Teams, and Development Teams Asking them:
“What scares you the most about your IT infrastructure?”
The answers highlighted Security concerns, System Failure, Operational costs, and the complexities… Read More

Tagged with: , , ,
Posted in Cloud, DevOps, Infographic, Log Management

Troubleshooting with Nexpose Logs

Nexpose is the industry standard in Vulnerability Management, giving you the confidence you need to understand your ever-changing attack surface, focus on what matters, and create better security outcomes.… Read More

Tagged with: , , , ,
Posted in How To, Log Analysis

Subscribe to the Blog

Categories

Archives