Webcast – AC-Hunter with Azure

Zoom

Threat hunting in a cloud environment is tricky. The span port we depend on to get a copy of all network traffic doesn’t […]

Webcast – Threat Hunter’s Toolbox

Zoom

Every threat hunter needs a set of tools they can count on when completing a hunt. In this webcast, Chris Brenton will go […]

Webcast – Cyber Deception in AC-Hunter

Zoom

Cyber Deception is a strategy used to attract cyber criminals away from an enterprise’s true assets and divert them to a monitored decoy. […]