Sponsored by ComputerWeekly.com
This article is guideline of how to generate a visual representation of a given dataset and use in the evaluation of known security vulnerabilities. Although this example is based on the output of an automated vulnerability scanner (Nessus), the suggested information visualisation process can be applied to generate any kind of visualisation. Access >>>
Table of contents
- Visualisation in vulnerability management
- Basic graph design principles
- Interpret and decide
Premium Content for Free.
More Premium Content Accessible For Free
Cloud enabling the banking industry
This report explores how the banking industry architecture network (Bian) service landscape may be used to define a comprehensive commercial ...
CW Buyer's Guide to Enterprise Collaboration
In this 10-page buyer's guide, Computer Weekly highlights what the IT leader needs to know to decide on the future of the organisation's ...
Getting to grips with BYOD
BYOD is proliferating, but the smart move is to recognise that the device is ultimately far less important than the applications it runs and the data...