Breakpoint Blog

Benjamin Mossé • 13 Oct 2025

Logging Isn't the Problem. Detection Is.

The ACSC’s 2024–2025 Threat Report urges organizations to implement effective event logging.

If you’re just getting started, break it down into three dimensions:

  1. Location – cloud, endpoint, OT etc.
  2. Layer – network, OS, application
  3. Properties – usefulness and cost

In today’s enterprise, collecting logs is easy. What’s hard - and expensive - is making them useful.

The most under-logged area? Applications.

Why?

Most apps weren’t designed with security logging in mind.

Every app is different, so off-the-shelf detection rules don’t work.

That’s where custom detection engineering comes in.
You’ll need someone who can write tailored rules for your apps and your environment - because generic won’t cut it.

Recent Blog Posts

Benjamin Mossé • 15 Oct 2025

Restrict Administrative Privileges

Restricting admin privileges is one of the most common recommendations in cybersecurity. And like...
Benjamin Mossé • 14 Oct 2025

Action <> Reaction

Last month, I was speaking with a security team that had rolled out Security Awareness Training. ...