AI-powered
podcast player
Listen to all your favourite podcasts with AI-powered features
Applying knowledge of adversary behaviors in cyber
This chapter features speakers discussing their work in cyber, focusing on applying knowledge of adversary behaviors to more effective hunting and detection practices. They also explore the concept of breaches, the attacker's and defender's dilemmas, and the importance of addressing common intrusion techniques.