Webcast – AC-Hunter with Azure

Zoom

Threat hunting in a cloud environment is tricky. The span port we depend on to get a copy of all network traffic doesn’t […]

Webcast – Threat Hunter’s Toolbox

Zoom

Every threat hunter needs a set of tools they can count on when completing a hunt. In this webcast, Chris Brenton will go […]

Webcast – Cyber Deception in AC-Hunter

Zoom

Cyber Deception is a strategy used to attract cyber criminals away from an enterprise’s true assets and divert them to a monitored decoy. […]

Webcast – Getting the Details From Zeek

Zoom

High-level packet analysis tools give us the overview of what's on a network; they save us huge amounts of time. But every once […]

Webcast – Passive Fingerprinting with SMUDGE

Zoom

In this webcast, we are looking into what passive fingerprinting is and how to use Active Countermeasure's open-source tool SMUDGE. Join our Threat […]