Hacking the Gibson

Season 2 Episode 12 - Guerilla Logging


Listen Later

It seems like logs are the beginning and end of security. Where do they come from, where are they going, and how do they get there? More hosts, more systems, more applications – what do we do with them all, and how do we keep from drowning? In the episode, we talk about some of the functional basics of how to start dealing with logs as complexity starts to grow. This is less a structured course, and more of discussion to give you sign posts to help you find the right direction to go.
...more
View all episodesView all episodes
Download on the App Store

Hacking the GibsonBy Hackalope and Ymir