- About KEYW
The ability to monitor and oversee activity both on enterprise networks and within applications is becoming increasingly important, as hyper-connectivity has made it easier than ever to access information, according to a recent CIO Update report.
In identifying the top information security threats for 2012, the news provider noted that companies will have to improve their focus on and practice of log management to protect themselves next year.
"In today’s business environment, more users need to legitimately access more data from more places," the report started. "This requires the protection of data at every access point by using stronger credentials, deploying more secure, partner-accessible systems and improving log management and analysis."
With log monitoring, organizations can view activity in detail, making it easier to spot disruptions and possible malicious acts perpetrated from either inside or outside of the organization.
Such practices recently allowed the Hawaii Department of Taxation to uncover several insider threats that occurred as long ago as 2008. The incidents were promptly reported to the state's attorney general, according to a DOTAX release.