Exploit Detection and Vulnerability CorrelationWritten by Phil Hollows
http://www.openservice.com/solutions/vulnerability-correlation.jspVulnerability correlation is key to reducing false positive rate. The risk of any one attack clearly depends on whether or not target system is vulnerable to exploit being
| | Enabling Sarbanes-Oxley Security Monitoring ComplianceWritten by Phil Hollows
http://www.bitpipe.com/detail/RES/1097862548_724.htmlSecurity information management (SIM) and centralized log aggregation and consolidation solutions provide ability to comply with Sarbanes-Oxley's security monitoring requirements. Read how combining real-time threat analysis and vulnerability management capabilities with reporting and centralized log aggregation allows organizations to reduce risk of a successful compromise (including
|