Sponsored by ComputerWeekly.com
This article is guideline of how to generate a visual representation of a given dataset and use in the evaluation of known security vulnerabilities. Although this example is based on the output of an automated vulnerability scanner (Nessus), the suggested information visualisation process can be applied to generate any kind of visualisation. Access >>>
Table of contents
- Visualisation in vulnerability management
- Basic graph design principles
- Interpret and decide
Premium Content for Free.
More Premium Content Accessible For Free
Agile Foundations – the Agile Manifesto
In this extract from their book, Agile Foundations, Peter Measey and Radtac explain the key principles of the Agile Manifesto.
Big Data BlackOut: Are Utilities Powering Up Their Data Analytics?
This report from Capgemini Consulting identifies a disparity between the utilities industry's perception of big data analytics and its implementation...
CW Nordics – May 2015 Edition
Nordic countries top list of digital nations in the EU, outperforming others in the areas of broadband infrastructure, IT skills, web use, business ...