Requirements For Managing Security Information Overload
With each high profile security attack, enterprises have reacted with corresponding measures to mitigate that threat. For example, firewalls have been deployed to tighten perimeter security, Intrusion Detection Systems (IDS) have been installed to detect network and host-based intrusions and...