Blog / By Author Tricking the attacker while storing logs securely Its all about being smart and using the concept of defense in depth In this video I talk about – The Three Stages of logging using syslog – Why Three Stages. – Securing the logs