Educational content designed to help you detect, hunt and respond.
Using Deception Technologies to Defend Against Active Directory and Ransomware Attacks
Threat Hunting Checklist for Cyber Warriors
Using Machine Learning to Automate Detection and Response
Shaping the Adversary’s Perspective of the Attack Surface
Leveraging Cyber Threat Frameworks, Automation and Terrain Visibility to Detect and Respond Threats Prior to the Point of Impact
Implementing Deception Technologies