In an enterprise environment, should developers/maintainers be able to look at production logs by accessing the application servers?

I came across this practice, from a big company handling personal customer data, of not allowing developers/maintainers to look straight at the application logs (e.g. good old tail | grep) by connecting to the application servers through S… Continue reading In an enterprise environment, should developers/maintainers be able to look at production logs by accessing the application servers?

If an IP address is known, can all of its browsing activity be viewed by an outsider?

Internet service providers (ISP) can choose to have full information on the browsing activity of one of its subscribers.
Can an outsider, who is not the ISP, but who simply knows someone’s IP address, be able to somehow monitor the browsin… Continue reading If an IP address is known, can all of its browsing activity be viewed by an outsider?

How Logging Eliminates Security Blindspots to Better Identify Threats

The digital landscape continues to grow increasingly complex, and security risk and operational costs rise as digital transformation accelerates. According to research by McKinsey and Company, more than 70 percent of security executives believe that t… Continue reading How Logging Eliminates Security Blindspots to Better Identify Threats