Tricking the attacker while storing logs securely

Its all about being smart and using the concept of defense in depth In this video I talk about

– The Three Stages of logging using syslog

– Why Three Stages.

– Securing the logs 

Scroll to Top