Business case for an information security awareness programWritten by Gary Hinson
| | Exploit Detection and Vulnerability CorrelationWritten by Phil Hollows
http://www.openservice.com/solutions/vulnerability-correlation.jspVulnerability correlation is key to reducing false positive rate. The risk of any one attack clearly depends on whether or not target system is vulnerable to exploit being
|