Thoughts by Jeff Stein
Tokens are a great way to engage your dashboard audience by allowing them to provide input on the value of data as well as dynamically filter visualizations. In addition to using tokens to guide the visualization of the data on a dashboard you can manipulate the tokens, set on the dashboard, and change the value associated with them.
There are three main steps that should always take place during a vulnerability assessment. These steps cover the discovery, enumeration and detection phases of the vulnerability assessment. Following all three of these steps will ensure you are providing a solid foundation for your vulnerability management program.
Working in information security I find Splunk is a very beneficial tool to use in normalizing and reviewing data to identify areas of concern. Dashboards are a great way to visualize that data in Splunk. With the right knowledge you can use tokens to not just display data but rather engage your audience by providing them the tools to interactive and guide the visualization of the data. With that in mind I thought I would highlight some of my favorite ways to leverage tokens on a dashboard.
Vulnerability assessments and penetration tests are two very common vulnerability management techniques used to better secure an environment. While both can be encompassed in a vulnerability management program each serves a different purpose with potentially very different security objectives.
What can you do to counter a denial-of-service attack? There are a number of ways to counter denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks. This thought focuses on ways to remediate an attack in progress and is a part of a four part series on countering DoS and DDoS attacks.
Thoughts Scripts Published Works Courses