Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Edge Articles

4/6/2021
10:30 AM
Pam Baker
Pam Baker
Edge Features
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

9 Modern-Day Best Practices for Log Management

Log management is nothing new. But doing so smartly, correctly, and concisely in today's data-driven world is another story.

Purge Responsibly

The sheer volume of logs to be managed shows no signs of slowing. But don't dump logs too soon to make room for more.

"Even with a solid SIEM in place, it can still be overwhelming," says Keatron Evans, an infosec skills author at Infosec Institute. "Also, these logs are not kept indefinitely in most cases. The high volume means they have to generally be purged often to make room for new logs. Storage is a major challenge for enterprise logging."

While only one part of a strong security architecture and plan, logs are often critical to forensic investigations.

"Developing effective response strategies before a cyberattack occurs is key, as all the logging in the world won't detect an event if the logs weren't monitored to begin with," says Baker.

(Image: lassedesignen via Adobe Stock) 
A prolific writer and analyst, Pam Baker's published work appears in many leading publications. She's also the author of several books, the most recent of which is "Data Divination: Big Data Strategies." Baker is also a popular speaker at technology conferences and a member ... View Full Bio
Previous
9 of 10
Next
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Name That Edge Toon: In Tow
Flash Poll