How MITRE ATT&CK helps security operations

5 years ago 4725 Views

A Threat Hunter Himself

7 years ago 6398 Views

Вопросы к DLP

8 years ago 1984 Views

IDM - это непросто!

9 years ago 2094 Views

Drive by-download attack evolution zero nights v3

12 years ago 1374 Views

Мониторинг своими руками

8 years ago 5533 Views

Threat hunting as SOC process

7 years ago 2437 Views

Infosecurity management in the Enterprise

10 years ago 1435 Views

Opensource vs. Non-opensource

9 years ago 1425 Views

Роботы среди нас!

3 years ago 1533 Views