
Mic Drop: Catching a tempest in a honeypot
Click Here
00:00
Endpoint Detection vs. NADPOT
This chapter explores endpoint detection methods and contrasts them with the NADPOT system for monitoring cyber threats. It also recounts a notable incident tied to a Chinese threat actor, illustrating the tactics used by adversaries and the subsequent response processes after an intrusion is identified.
Transcript
Play full episode