LogLurker Thr foundation of a good security program

11Aug/15Off

The time has come


 

For fifteen years, I have happily toiled in the Information Security realm.  My previous experience included web development and various network and system administration roles.  During my career, I have spent a great deal of time digging through various device and application logs.  I have gotten very good at identifying anomalies and spotting trends.   I have also become quite the stickler for data quality.  It's difficult to spot anomalies in logs that are full of "junk".  It never ceases to amaze me how little most device and application administrators care about their logs.  Many never look at them at all.  I've even encountered a few who either turn off logging or regularly delete their unreviewed logs to free up space on their hardware.



The time has come for me to start sharing some of what I have seen.  Hopefully, these observations will assist, or at least comfort, others in the Information Security realm.


 

Comments (0) Trackbacks (0)

Sorry, the comment form is closed at this time.

Trackbacks are disabled.