Secure Setup of a Corporate Detection and Scanning Environment
This paper covers the secure deployment of a distributed intrusion detection environment as well as the secure deployment of a distributed vulnerability scanning environment. Since a lot of companies do not have the proper security budget (yet), the focus of this paper lays on using open source...