Top Excuses For Foregoing Security Monitoring, Logging

Monitoring for security incidents can be tough. It's tougher when you don't know what to look for. Now imagine trying to investigate an incident when you don't have any logs to analyze.

John H. Sawyer, Contributing Writer, Dark Reading

September 28, 2010

1 Min Read
Dark Reading logo in a gray background | Dark Reading

Monitoring for security incidents can be tough. It's tougher when you don't know what to look for. Now imagine trying to investigate an incident when you don't have any logs to analyze.In this day and age, it's simply irresponsible for organizations to shrug the value and basic need of having a centralized logging infrastructure. Instead, they make excuses for why it can't be done and let the logs autorotate themselves into the ether.

There are two excuses I hear repeatedly regarding why organizations (of all sizes) don't enable logging, centralize the logs, and monitor them in some way.

About the Author

John H. Sawyer

Contributing Writer, Dark Reading

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights