How to avoid security blind spots when logging and monitoring

This article has been indexed from

Help Net Security

Cybersecurity involves a balancing act between risk aversion and risk tolerance. Going too far to either extreme may increase cost and complexity, or worse: cause the inevitable business and compliance consequences of a successful cyberattack. The decisions that need to be made around logging and monitoring are no exception. Capturing all data from every device on the network can create bottlenecks, overwhelm log management, and obfuscate signs of network penetration, or malicious activity. Not capturing … More

The post How to avoid security blind spots when logging and monitoring appeared first on Help Net Security.

Read the original article: