Webcast – Applying The Threat Hunter’s Runbook
ZoomSo you've studied threat hunting methodology and researched all the threat hunting tools... but how do you actually apply all this knowledge into […]
So you've studied threat hunting methodology and researched all the threat hunting tools... but how do you actually apply all this knowledge into […]
Threat hunting in a cloud environment is tricky. The span port we depend on to get a copy of all network traffic doesn’t […]
Every threat hunter needs a set of tools they can count on when completing a hunt. In this webcast, Chris Brenton will go […]