Real world scenario
In one of the organizations I worked with, in the initial week of joining, I had reported many security holes and vulnerabilities that needed to be fixed; however, the response I got from the management was that currently there were lot of new product updates that needed to be released in production and they would look into these loopholes afterwards.
I left the organization soon after, as I didn't want to be in the security team when the organization was breached and then everything would come down to the security team.
Having said that, the frequency of alerts and differentiation from false positive acts as a keystone in continuous security monitoring. Many times, system administrators will just set up tools such as ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access