Con·tin·u·ums
\ken-tin-yu-ems\ (n.) :
To go through a gradual transition from one condition, to a different condition, without any abrupt changes.

April 15, 2019

In Security, All Logs Are Not Created Equal
Prioritizing key log sources goes a long way toward effective incident response.

Like a triage nurse, security professionals have to prioritize the data that will help them best identify problems and keep the organization, its data, and devices safe from intruders and cyberattacks.

However, logging and monitoring all relevant events from across the IT environment can be challenging. For instance, some common log sources, such as servers, firewalls, Active Directory, intrusion detection systems, and endpoint tools, are fairly easy to ingest and parse. But other sources that are particularly valuable for incident response (IR) are difficult to manage at scale and rarely ingested because of the effort it takes.

Redundancy, on the other hand, is when I (or my organization) keeps trying the same approach and nothing changes. It makes no sense to expect different results without a different approach. This, of course, is the definition of redundancy. What can the difference between repetition and redundancy teach us about security? An awful lot.

Ask a Continuums Representative about a security strategy to solve security issues within your enterprise business.

For a copy of this Dark Reading Article, Click To Download


Continuums provide a suite of Enterprise Information Technology (EIT) consulting services and strategies. These elements are designed to help businesses maintain operational efficiency while mitigating risk associated with security and adopting new technologies. Our team of certified and experienced experts will support your business in the following areas:

Enterprise Resource Planning   Strategies

Business Continuity Strategies

End-to-end IP Networking   Strategies

Enterprise Design and   Development Strategies

Information Security Enterprise   Solutions Architect

FISMA Compliance, IA    Compliance, and IATO/ATO   Compliance

Enterprise CyberSecurity   Strategies

Systems Security Engineering   Strategies

Technology Refresh and IT   Transition Management   Strategies

Enterprise IT Asset Management   Strategies

Technical Project Management


Copyright © 2019 Continuums Corporation
All Rights Reserved.