For most of the security industry’s history, logs were the problem to solve. Attacks were easy to spot in events: Failed ...