3 min
Log Management
Using Log Data as Forensic Evidence
This is a guest post by Ed Tittel. Ed, a regular contributor to
blog.logentries.com [https://blog.logentries.com/], has been writing about
information security topics since the mid-1990s. He contributed to the first
five editions of the CISSP Study Guide (Sybex, 6e, 2012, ISBN:
978-1-119-31427-3) and to two editions of Computer Forensics JumpStart (Sybex,
2e, 2011, ISBN: 978-0-470-93166-0), and still writes and blogs regularly on
security topics for websites including Tom's IT Pro, GoCertify.co