cisa video for an IS Auditor is tasked with evaluating the effectiveness of security monitoring tools. The Auditor discovers that the organization lacks
An IS Auditor is tasked with evaluating the effectiveness of security monitoring tools. The Auditor discovers that the organization lacks visibility into network traffic and vulnerabilities. Which security monitoring tool or technique is recommended to address this issue and improve network security?