Bringing the information out of the information
When faced with an enormous amount of data, in our case, Cyber Security related data, it is easy to miss the real points. Current available systems are very good at pinpointing single or even common occurrences of for instance intrusion attempts, DDOS-attacks etc., but usually fail to give the overview to those in need, in [...]