Log360 | December 3, 2018Conquer it with correlation—Part 2: The data breach In my previous post, we looked at how event correlation can be used to deal with advanced...