Listen

Description

Audit logs vs Kernel data. Each are valuable, Paul Vout describes the reason that each are needed to assure cyber security