ABSTRACT

Malicious actors keep changing how they deploy attacks. Meanwhile, security researchers continuously identify new vulnerabilities in software, firmware, and operating systems. In a dynamic IT environment, continuous monitoring for new threats and risks is critical. This chapter outlines what continuous monitoring is and the technologies that enable it.