Every platform and applicaiton record the activity of the system, users and data access. We call these logs. Security logs are a subset that contain sensitive information about the backend details of the components, communications and accounts used. This episode talks about a very large breach that didn't steal user's data but security logs and why it's crticial to treat and protect them.
Be aware, be safe.
*** Support the podcast with a cup of coffee *** - Ko-Fi Security In Five
Don't forget to subscribe to the Security In Five Newsletter.
—————— Where you can find Security In Five ——————
Security In Five Reddit Channel r/SecurityInFive
Security In Five Podcast Page - Podcast RSS
iTunes, YouTube, TuneIn, iHeartRadio, Spotify, Stitcher
Email - bblogger@protonmail.com