Attacks/Breaches

1/28/2008
01:30 AM
50%
50%

Enterprises Rolling on Logs

Once seen as a necessary evil, security logs are now becoming an everyday data source, survey says

Security and system logs are things you pull up when you have no other choice -- when a problem occurs and that's the only way to find it, right?

Wrong, according to a survey conducted recently by SenSage Inc. , a security information and log management vendor. In an informal poll of its customers, SenSage has discovered that 75 percent of enterprises are now looking at logs every day.

"We were surprised by the responses," Ed Chopskie, vice president of marketing at SenSage, tells Dark Reading. "It wasn't so long ago that looking at logs was sort of a last resort."

The need for regulatory compliance is what's causing the shift, Chopskie says. Now that auditors are looking for data to prove security and access control, logs are becoming a more everyday source of information.

And enterprises are storing and using those logs much longer than they did previously, Chopskie says. In the survey, 74 percent of respondents said they store log data for more than 12 months -- likely a hedge against future audits, he feels.

Enterprises also are checking a wider variety of logs -- including systems like routers, databases, and mainframes -- and distributing the data to Windows administrators and others who aren't normally associated with security, the company said.

— Tim Wilson, Site Editor, Dark Reading

Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
12 Free, Ready-to-Use Security Tools
Steve Zurier, Freelance Writer,  10/12/2018
Most IT Security Pros Want to Change Jobs
Dark Reading Staff 10/12/2018
6 Security Trends for 2018/2019
Curtis Franklin Jr., Senior Editor at Dark Reading,  10/15/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-18381
PUBLISHED: 2018-10-16
Z-BlogPHP 1.5.2.1935 (Zero) has a stored XSS Vulnerability in zb_system/function/c_system_admin.php via the Content-Type header during the uploading of image attachments.
CVE-2018-18382
PUBLISHED: 2018-10-16
Advanced HRM 1.6 allows Remote Code Execution via PHP code in a .php file to the user/update-user-avatar URI, which can be accessed through an "Update Profile" "Change Picture" (aka user/edit-profile) action.
CVE-2018-18374
PUBLISHED: 2018-10-16
XSS exists in the MetInfo 6.1.2 admin/index.php page via the anyid parameter.
CVE-2018-18375
PUBLISHED: 2018-10-16
goform/getProfileList in Orange AirBox Y858_FL_01.16_04 allows attackers to extract APN data (name, number, username, and password) via the rand parameter.
CVE-2018-18376
PUBLISHED: 2018-10-16
goform/getWlanClientInfo in Orange AirBox Y858_FL_01.16_04 allows remote attackers to discover information about currently connected devices (hostnames, IP addresses, MAC addresses, and connection time) via the rand parameter.