Information security practitioners are overloaded with information. There is network information, like reports of scans, viruses, worms and spam blasts. There are reports from host and authentication ...