log management
What Is Log Management, and Why Is It Important?
I think we all know what log management is. As discussed in a 2017 article for The State of Security, log management is about systematically orchestrating the system and network logs collected ...
Tripwire Products: Quick Reference Guide
Here at The State of Security, we cover everything from breaking stories about new cyberthreats to step-by-step guides on passing your next compliance audit. But today, we’d like to offer a straight-forward ...
Rooted in Security Basics: The Four Pillars of Cyber Hygiene
The term “cyber hygiene” pops up frequently in articles, blogs and discussions about cybersecurity. But what does it really mean? Some say it is an ill-defined set of practices for individuals to ...
Defending our Digital Homeland: Preventive Control Is Only The Beginning
Sir Winston Churchill spoke of fighting wherever and whenever to defend the homeland. The battle we face now in securing networks requires that same broad approach of defending and fighting everywhere we ...
Log Management for Government Agencies: What You Need to Know
Without a doubt, log management should be part of the core of any IT security platform of a government agency. It has a role in not only security but also in operations ...
What Is Passive Asset Discovery, and Is It That Important?
Let’s first talk about asset discovery in general and why it is useful, even critical, to most organisations. What Is Asset Discovery? Asset discovery is the ability to provide visibility of all ...
20 Critical Security Controls: Control 6 – Maintenance, Monitoring, and Analysis of Audit Logs
Today, I will be going over Control 6 from version 7 of the CIS top 20 Critical Security Controls – Maintenance, Monitoring, and Analysis of Audit Logs. I will go through the ...

