The Best Defense is a Good Offense: Using Correlation to Actively Fend off Attacks


In most of today's enterprise IT departments, security teams are currently employing vulnerability management as well as intrusion detection and prevention techniques. We'll take a look at common aspects of both vulnerability management and intrusion detection systems, exploring the most common ways that these products and processes are configured.