As internet activity and the use of technology increase so does the landscape for vulnerabilities that can be abused by cyber-criminals. In today's world, it is not the question if a cyber attack will happen but rather when will it happen. Therefore, to protect ourselves from attacks we have to find the vulnerabilities before they can be exploited. This is where security information and event management together with log strategies come into play as they focus more on the detection and response of threats rather than only trying to prevent them. However, organizations should still define their log strategy and log management solution as a means to gain better insight into any vulnerabilities that may exist within their infrastructure. Logs ...