The Curious Case of Dual Event Logs
It’s better to have logs and not need them, than to need logs and not have them. And the same applies to dual-logs. With dual-logs, cyber attackers are putting themselves in danger and revealing their intentions every time they wipe their events from the log.