Click Here cover image

Mic Drop: Catching a tempest in a honeypot

Click Here

00:00

Endpoint Detection vs. NADPOT

This chapter explores endpoint detection methods and contrasts them with the NADPOT system for monitoring cyber threats. It also recounts a notable incident tied to a Chinese threat actor, illustrating the tactics used by adversaries and the subsequent response processes after an intrusion is identified.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app