With Great Power Comes Great Responsibility
Following the UK Conservative Party Conference this week, many headlines honed in on the government’s plan to create a battalion of cyber reserves to protect the country from online attacks. There is an ongoing cyber security skills shortage in the…
Read More
March 10, 2013
Understanding a Basic Web Attack Using Log Data
A colleague of mine recently asked me to take a look at some logs he was investigating. The LogRhythm Web Application Defense Module had initially keyed him into the suspicious behavior and he was now examining the raw logs to…
Read More
February 22, 2013
Federal Compliance Update FedRAMP
The U.S. Federal Government has expanded their service offerings by outsourcing infrastructure to cloud-based services providers. The use of cloud-based services comes with inherent risk. However, the Federal Office of Management and Budget (OMB) has been working diligently over the…
Read More
February 4, 2013
Using Logger to Send File Data to SYSLOGD
If you find yourself needing to have the contents of an ASCII text file written to syslog, then consider the use of the logger command. This comes with most Unix distributions and has also been ported to the Windows platform.…
Read More
February 27, 2012
Controlling Access to Windows 2008 Event Logs
On systems running 2003, any user account needing the ability to read other system’s event logs required that the registry to be edited and some SDDL (Security Descriptor Definition Language) entries be made on all respective remote systems. In 2008 it has…
Read More
February 16, 2012
The Benefits of Logging Disk Space Warnings or Errors
Disk capacity requirements will vary depending on the purpose of the associated system and applications utilizing the storage space. When there is no longer any free disk space available, the effect can be minor to border-line catastrophic. And a catastrophic failure usually…
Read More
November 1, 2011