Articles explains how you can use logs to deploy proactive, defensive, controls based on network activity.
Articles explains what log management is and why it matters.
Articles explains how log management and SIEM technology can strenghten security governance programs.
This article explains how log management fits into the security paradigm.
In this article we explore the best practices and the type of events that you should always store in your central logging server.
This article explains why it is important to include remote logging as a piece of your log management strategy.
Log management is difficult because of the shear scope of devices that need to be monitored.