Chapter 25
Complex Event Processing for Automated Security Event Analysis
Rob Shein
Over the past 15 years, the same mantra has wound its way through the security industry, particularly the entities and offerings concerned with incident detection and response: “Collect More Data.” The problem is that although the means to collect and store that data has grown in both variety and scale (as have the sources of the data that can be collected), the means to analyze that data has not kept pace. As a result, what began as one or two IDS devices and/or ...
Get Information Security Management Handbook, Volume 6, 6th Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.