You are viewing 'DoS'
Doug Picotte | December 02, 2011
The amount of log volume produced by security devices, servers, network devices, applications, and databases can be staggering. In the past, our log volume monthly processing statistics were in the millions. Fast forward to today and beyond, and we are talking about processing billions of log messages in a given month for a single organization. Just imagine the size of log file that is created by a Fortune 500 organization just during the course of normal operations. Now multiply that in times of heavy load, like a retail or travel operations over the holidays. Or try to imagine what those logs look like in a crisis such as during an active cyber attack or a DoS attack.
The key, of course, is to find the proverbial “needle in a haystack” that we can translate into an actionable alert for our client base. Recently there has been much discussion about log volume, and what type of logs we should be looking at for clients. As you can imagine, many log... read more >
Tags: ActiveGuard, cyber attacks, log management, log monitoring, PCI Compliance, application event logs, DoS, event logging, log processing
Doug Picotte | October 27, 2011
Salutations, pop culture and security lovers! I have been fighting a cold for the last two weeks. During this last week however, I decided to simply go into denial mode. I kept telling myself I was not sick. I still felt lousy physically while kidding myself, but in some small way I felt better mentally. We play the same denial game up here in the north with the weather this time of year as well. You can still see folks walking around in shorts and sandals in 40 degree temperatures! Speaking of being in denial, we have recently observed an influx of Denial of Service (DoS) and Distributed Denial of Service (DDoS) incidents within our lovely industry.
DoS and DDoS Attack Overview
I would like to take a... read more >
Tags: DDoS, DoS