Get the latest federal technology news delivered to your inbox. Insufficient logging hampers an organization’s ability to detect intrusions, mitigate those in progress and determine the extent of an ...
Some data sources present unique logging challenges, leaving organizations vulnerable to attack. Here’s how to navigate each one to reduce risk and increase visibility. All logs are not created equal.
Alexander Slagg is a freelance writer specializing in technology and education. He is an ongoing contributor to the CDW family of magazines. A Government Accountability Office report released in ...
Karen Scarfone is the principal consultant for Scarfone Cybersecurity. She provides cybersecurity publication consulting services to organizations and was formerly a senior computer scientist for the ...
The authors do not work for, consult, own shares in or receive funding from any company or organization that would benefit from this article, and have disclosed no relevant affiliations beyond their ...