Comments on Draft NIST Special Publication 800-92r1 “Cybersecurity Log Management Planning Guide”

11 months ago 37
News Banner

Looking for an Interim or Fractional CTO to support your business?

Read more
Originally published by Gigamon. Written by Orlie Yaniv, Ian Farquhar, and Josh Perry. Editor’s note: the mechanisms by which organizations derive observability and visibility generally fall under the title of telemetry, and the most prevalent form of telemetry is logging. As we see increased threat actor understanding of evasion techniques, we need to strengthen and protect logging, which means expanding it from the typical device- and application-based logs of the past, and into new types o...
Read Entire Article