All Talks

A Crash Course in Audit Logs

Application audit logs include a breadcrumb trail of all user activity and the logs are used to answer many different questions in a variety of contexts. Development teams perform analytics on the logs. Security teams write threat detection logic on the logs. Customers will arbitrarily request the logs. Government regulations (GDPR, CCPA, etc.) will mandate that you save them, but then eventually delete them. Your responsibility as a developer or security engineer is to make sure the logs are …

You might be interested in:

February 2020 DevOps
Keynote: Getting Started as an Open Source Contributor Keynote: Getting Started as an Open Source Contributor

Keynote: Getting Started as an Open Source Contributor

Ihor Dvoretskyi & Nikhita Raghunath

November 2019 DevOps
Minikube Minikube

Minikube

Thomas Strömberg & Medya Ghazizadeh, Google