Blog
Log Management: Understanding What Happened in a Security Event
By David Bisson on Mon, 08/22/2016
Security configuration management (SCM) is central to an endpoint detection and response (EDR) strategy. It allows organizations to keep track of changes to their network devices, including those implemented by an unauthorized actor. As I discuss in another blog post, one of the most important features of an SCM program is the creation of a "secure...