Interested in getting a quick overview of Security Visualization? I am guest-blogging on IT World. There you can find a series of blog entries about how to generate your own security visualizations:
(Update 12/05/08: Fixed the links. Sorry!)
- How do you encode hundreds of data points into one single graph? Use Sparklines.
- How do you visualize your traffic flow (NetFlow) logs?
- How do you prepare your security data for visualization?
- What is the right graph to use in what situation?
- How do you create good visualizations?
- How Do You Get Started With Security Visualization?