With the limited time (even using automated tools) to detect and respond to an attack - which means detailed log review, the task of the defender is the greater and more challenging. And if a...