Trout - Blog

How to perform Log Analysis ?
Industrial

How to perform Log Analysis ?

Discover the power of log analytics : Streamlined Troubleshooting, Strengthened Security Monitoring, Optimized Performance and make Data-Driven...

Understanding Playbooks in Cyber Security
Tech

Understanding Playbooks in Cyber Security

Understand what is a cybersecurity playbook, what are the differents functions of it and what are the differents types of playbooks. Read Now !

Hello SQLite !
R&D

Hello SQLite !

This November, we decided to open source one of our internal libraries to the world: the driver we use for data persistence.

What are the ISO 27001 Logging Requirement ?
Compliance

What are the ISO 27001 Logging Requirement ?

Control 8.15 - Logs that record activities, exceptions, faults and other relevant events should be produced, stored, protected and analysed

Get notified about Trout articles

Receive an email when our team releases new content.