Some data sources present unique logging challenges, leaving organizations vulnerable to attack. Here’s how to navigate each one to reduce risk and increase visibility. All logs are not created equal.