RSA Conference Preview: Dreaming of Indicators of Compromise

Today, many organizations are collecting log data from systems, applications and network devices to generate operational statistics and/or alerts of abnormal behavior. However, a major shortcoming of this approach is that valuable security data is often not visible in this log data. This leaves out an important piece of the puzzle: context.

Read the full article