Log Management News, Articles and Updates

How to find a 'Super Hacker'

Anomaly-based detection, rather than signatures or threat intelligence, is more likely to detect nation-state and advanced criminal 'Super Hackers' before they can gain a significant foothold on networks says Peter Cohen.

Poor measurement leaves networks dangerously open to attack

The ever-changing threat landscape is causing problems, with many business networks unable to keep up with the pace of innovation, argues Gavin Millard.

More questions than answers as BBC outage fuels DDoS talk

The British Broadcasting Corporation was hit by a prolonged outage on its website and iPlayer video-on-demand service (VOD) last weekend, raising questions about the cause and whether it was subjected to a distributed-denial-of-service (DDoS) attack.

Keeping the cyber bandits at bay with Big Data

Big Data security analytics could trump SIEM solutions in the battle to keep out cyber attackers.

160,000 new malware samples arriving every day

Log management and file integrity management may be the solution - Randomstorm head of R&D Steve Jones.

Two in three companies 'blind' to data breaches

Trustwave's annual Global Security Report reveals that the number of data breaches is increasing, and yet a significant number of organisations remain blind to the threat, or unable to detect what caused the intrusion.

Bitly embraces two-factor authentication after data breach

Following criticism over the lack of details provided on last week's data breach, URL shortening service Bitly has finally revealed how hackers were able to compromise user accounts.

Big Data: A big deal?

IT decision makers are leveraging Big Data security analytics tools to serve up more information on threats, reports Doug Drinkwater.

Security tech budgets rising, says new study

Information security budgets will increase in 2014, with 45 per cent of organisations planning to spend more this year and only 11 per cent cutting back, according to the latest Information Security Study from 451 Research.

Apple Safari: not as secure as you might think

`Secure' online banking and payment credential pages accessible to hackers

Bit9: A lack of insight into endpoint threats requires greater intelligence for users

Users are blind to threats that occur on the endpoint and require intelligence to understand the threat, according to Bit9.

Big Data awareness week further highlights challenges

Businesses across the UK are failing to turn the data at their disposal into a competitive advantage.