Two days ago, I attended an event about “big data” (yeah, another buzz word) and how to use it for security purposes. One of the presented talks was very interesting and almost changed my mind about our best friends (or nightmare)… logs! When I’m talking about log management with customers,
Tag: Logs
Monitoring pastebin.com within your SIEM
For those who (still) don’t know pastebin.com, it’s a website mainly for developers. Its purpose is very simple: You can “paste” text on the website to share it with other developers, friends, etc. You paste it, optionally define an expiration date, if it’s public or private data and your are
From Logs to Hell!
I have hesitated a while before choosing the right image to illustrate this article. I read again a press-release about a new log-management product which pretends to provide “out-of-the-box security and compliance for business of all sizes“. Dear v€ndor, are you living in a care bears world or are you
All You Need Are Logs
Based on the melody of “All You Need Is Love” (John Lennon) Logs, logs, logs, logs, logs, logs, logs, logs, logs. There’s nothing you can search that can’t be found. If all your agents collected events around. Nothing you can miss but you can learn how to correlate. It’s easy.