Pr0teus - slides


Enemy spotted - Applying infovis at security field

The security field recently has experienced strong growth also as the number of tools to attack or defend our networks: Nmap, Nikto, Metasploit, (H|N)IPS, IDS, firewalls, exploits and CVEs. Every day we have more security related data that we must keep track of in order to survive in this war. Applying information visualization techniques can help us to keep an open eye, better understand, to attack and respond those threats.

Enemy spotted - Applying infovis at security field

Enemy spotted - Applying infovis at security field

The security field recently has experienced strong growth also as the number of tools to attack or defend our networks: Nmap, Nikto, Metasploit, (H|N)IPS, IDS, firewalls, exploits and CVEs. Every day we have more security related data that we must keep track of in order to survive in this war. Applying information visualization techniques can help us to keep an open eye, better understand, to attack and respond those threats.