Enterprise Security Weekly (Audio) cover image

ESW #270 - Dan Allen & Will Lin

Enterprise Security Weekly (Audio)

00:00

Is There Anything You Want to Share That You Don't Trust?

Yootat collects the all of the hashes of the payloads that ran, all the ip addresses that that container was attempting to communicate with. It's like running a little hot honey pot. And so what our customers do is then feed that threat data into their visibility tools and they can use it to make those other systems more valuable and effective.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app