Sage Advice - Cybersecurity Blog

Video: The Importance of Context in Log Analysis for Malware Detection

A big challenge for organizations when it comes to malware detection is their inability to correlate network log events between different devices. Sophisticated malware mimics normal user behavior in order to mask its identity, and can go undetected by real-time intrusion detection systems. However, examining behavioral attributes (i.e. connection points, traffic sizes, timing frequencies, etc.), places the event activity in the appropriate context, and allows you to detect this automated behavior and expose the threat. In the below video, Ron Bernier, Director & Chief Architect of Tyler Detect, discusses an example of how Tyler Detect uses context to detect a malware intrusion. 

 

Read More

Topics: Log Analysis, Threat Detection Tips

What are the Benefits of Outsourced Event Log Management?

Every day, companies like yours experience threatening situations, some initiated by malicious intent, and others due to simple human error. The key to mitigating this danger lies deep within the hundreds of thousands of log entries produced every day by your servers, network devices, and applications. However daily log analysis can be challenging because of the time, effort, and expertise required to consistently evaluate and analyze your log entries. If this is the case for you, then log analysis as a service could make your life a lot easier.

Read More

Topics: Compliance, Log Analysis, Threat Detection Tips

Information Security Compliance Standards for Event Log Management

Monitoring event logs is more than just good policy for securing an IT infrastructure – it is also an integral part of complying with a number of information security compliance standards. These regulations span multiple industries, from financial to healthcare to general business. Following are some insights into these regulatory requirements, and ways that event log management can help your firm comply.

Read More

Topics: Compliance, Log Analysis