It seems like logs are the beginning and end of security. Where do they come from, where are they going, and how do they get there? More hosts, more systems, more applications – what do we do with them all, and how do we keep from drowning? In the episode, we talk about some of the functional basics of how to start dealing with logs as complexity starts to grow. This is less a structured course, and more of discussion to give you sign posts to help you find the right direction to go.