Continuing with the OWASP Top 10 Proactive Security Control for Developers we are at number 9. This control talks about logging & auditing but for security purposes. Applications log but security logs require different data and are used for different purposes. This episode goes over the control.
Don't forget to subscribe to the Security In Five Newsletter.
Be aware, be safe.
------------------------------------
Website - https://www.binaryblogger.com
Podcast Page - http://securityinfive.libsyn.com
Podcast RSS - http://securityinfive.libsyn.com/rss
Twitter @binaryblogger - https://www.twitter.com/binaryblogger
iTunes - https://itunes.apple.com/us/podcast/security-in-five-podcast/id1247135894?mt=2
YouTube - https://www.youtube.com/binaryblogger
TuneIn Radio - Security In Five Channel
Spotify - Security In Five Podcast Page
Stitcher - Stitcher
Email - contactme@binaryblogger.com