Logs are important. We need them to investigate, monitor, and analyze. In cybersecurity, we have many tools for generating logs, and extracting those logs to a central repository is a common routine. However, the methods and tools for capturing logs are not always common. In this post, I’ll provide an overview of several options available to users of Signal Sciences for capturing request logs.

Read full news article on Dzone