Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Edge Articles

10:30 AM
Pam Baker
Pam Baker
Edge Features
Connect Directly

9 Modern-Day Best Practices for Log Management

Log management is nothing new. But doing so smartly, correctly, and concisely in today's data-driven world is another story.

Log at Different Points

According to Kevin Madura, SVP at global consulting firm AlixPartners, businesses should turn on "more verbose logging" everywhere possible – within computational and financial restraints of course – including for applications, application servers, Web servers, load balancers, and network appliances such as firewalls, switches, routers, and endpoints.

"It's critical to log at these different points within the network, which can be useful for investigators to understand how the attacker got in and how they pivoted within the network, as well as where they went after initial intrusion," he says. "This also helps determine which systems and data may have been compromised during the attack to determine if any other systems should be examined forensically."  

(Image: Anikakodydkova via Adobe Stock)

A prolific writer and analyst, Pam Baker's published work appears in many leading publications. She's also the author of several books, the most recent of which is "Data Divination: Big Data Strategies." Baker is also a popular speaker at technology conferences and a member ... View Full Bio
3 of 10
Print  | 
More Insights
Flash Poll