Reviewing multiple logs in addition to security scan results report

​Security scanning reports need not be the only source of security related data. They can be correlated with other sources.

Such sources include:

Logs. There are different types of logs. Logs will show if there are attempts to exploit a vulnerability, or if that vulnerability is being used.

Security logs can be correlated with other logs.

Correlation of logs can be done with help of SIEM tools.

Comments

Popular posts from this blog

Absolute and relative path in HTML pages

Errors

goto PHP operator