If you cannot measure, you cannot manage. This is an age old saying, but still very true, especially within the current South African cybercrime scene and the ever-growing Internet footprint. Due to the significant increase in cybercrime across the globe, information security specialists are starting to see the intrinsic value of logs that can ‘tell a story’. Logs do not only tell a story, but also provide a tool to measure a normally dark force within an organisation. The collection of current logs from installed systems, operating systems and devices is imperative in the event of a hacking attempt, data leak or even data theft, whether the attempt is successful or unsuccessful. No logs mean no evidence, and in many cases not even the oppo...
The potential impact that data leakage can have on a country, both on a national level as well as on...
As internet activity and the use of technology increase so does the landscape for vulnerabilities th...
This paper will look at the current state of visualization in relation to mainly malware collector l...
If you cannot measure, you cannot manage. This is an age old saying, but still very true, especially...
With the advancement of technology, concepts such as cyber and digital anthropology concepts have st...
Throughout the years, computer networks have grown in size and complexity. This growth attributed to...
Logging security incidents is a required security measure in every moderately complex computer syste...
With the recent escalating rise in cybercrime, firewall logs have attained much research focus in as...
Critical industrial systems have become profitable targets for cyber-attackers. Practitioners and ad...
It becomes a problem when you have several firewalls, intrusion sensors or servers and to top it off...
Forensic analysis of logs is one responsibility of an enterprise cyber defense team; inherently, thi...
The need for Firewall Log Filter. In many cases, it is possible to detect patterns by browsing the l...
peer reviewedDealing with large volumes of logs is like the prover- bial needle in the haystack pro...
The 27th IEEE International Requirements Engineering Conference, Jeju Island, South Korea, 23-27 Sep...
This paper will look at the current state of visualization in relation to mainly malware collector l...
The potential impact that data leakage can have on a country, both on a national level as well as on...
As internet activity and the use of technology increase so does the landscape for vulnerabilities th...
This paper will look at the current state of visualization in relation to mainly malware collector l...
If you cannot measure, you cannot manage. This is an age old saying, but still very true, especially...
With the advancement of technology, concepts such as cyber and digital anthropology concepts have st...
Throughout the years, computer networks have grown in size and complexity. This growth attributed to...
Logging security incidents is a required security measure in every moderately complex computer syste...
With the recent escalating rise in cybercrime, firewall logs have attained much research focus in as...
Critical industrial systems have become profitable targets for cyber-attackers. Practitioners and ad...
It becomes a problem when you have several firewalls, intrusion sensors or servers and to top it off...
Forensic analysis of logs is one responsibility of an enterprise cyber defense team; inherently, thi...
The need for Firewall Log Filter. In many cases, it is possible to detect patterns by browsing the l...
peer reviewedDealing with large volumes of logs is like the prover- bial needle in the haystack pro...
The 27th IEEE International Requirements Engineering Conference, Jeju Island, South Korea, 23-27 Sep...
This paper will look at the current state of visualization in relation to mainly malware collector l...
The potential impact that data leakage can have on a country, both on a national level as well as on...
As internet activity and the use of technology increase so does the landscape for vulnerabilities th...
This paper will look at the current state of visualization in relation to mainly malware collector l...