
Blueprint Live at SANSFIRE 2022: A panel with Heather Mahalik, Katie Nickels and Jeff McJunkin
Blueprint: Build the Best in Cyber Defense
00:00
What to Look for in Threat Intelligence?
Any time you are buying lists of ipaddreses, list of domain names and lists of hashes, you are buying burned c two that will never ever be used again. A maof product talking to maksoft is not inherently non malicious, but it's usually less interesting than some of the the louder stuff inside your environment. If thereere a whole bunch of mis spellings, no, right? Also, look out for people who are trying to scare you, who are like, well, this attack is super duper scar so buy our product. Take that with of salt.
Play episode from 35:17
Transcript


