What is lurking in your log files?

I found an interesting article on the importance of proactively monitoring your logs here: http://www.esecurityplanet.com/network-security/what-is-lurking-in-log-files.html