Get a Pentest and security assessment of your IT network.

News

5 Considerations For Post-Breach Security Analytics

Some of the most important security analytics tasks that organizations perform is done with the pressure of a running clock and exacting standards for how data is preserved and manipulated. Unlike day-to-day log analysis, post-breach inspection of security data requires special considerations in the collection and handling of information following a compromise. Organizations should retain at least a year’s worth of relevant log data, with three months’ worth online and ready to search at a moment’s notice, says Lucas Zaichkowsky.”]

Source: https://www.darkreading.com/analytics/5-considerations-for-post-breach-security-analytics

Related posts
News

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

News

Art of Twitter account hacking

News

SEA has stolen invoices that shows Microsoft charges FBI for user data

News

Greek police arrested a man running the BTC-e Bitcoin exchange to launder more than US$4bn worth of the Bitcoin