Get a Pentest and security assessment of your IT network.

News

5 Considerations For Post-Breach Security Analytics

Some of the most important security analytics tasks that organizations perform is done with the pressure of a running clock and exacting standards for how data is preserved and manipulated. Unlike day-to-day log analysis, post-breach inspection of security data requires special considerations in the collection and handling of information following a compromise. Organizations should retain at least a year’s worth of relevant log data, with three months’ worth online and ready to search at a moment’s notice, says Lucas Zaichkowsky.”]

Source: https://www.darkreading.com/analytics/5-considerations-for-post-breach-security-analytics

Related posts
News

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

News

Art of Twitter account hacking

News

Botnet authors use Evernote account as C&C Server

News

Canadian agency breached as hackers exploit CVE-2017-5638 flaw in Apache Struts 2