Practical AWS Logging in 5 Steps

Logging is probably one of the most crucial areas when a security or operational incident needs to be investigated…. is what most technology practitioners would say.  But, monitoring logs for malicious or unusual activity, carrying out threat hunting are proactive techniques to help organisations catch infiltrations or compromise early. This is KEY to reducing the […]