Cloud Security Podcast cover image

Threat Hunting in AWS

Cloud Security Podcast

00:00

Cloud Security

In an interrative process that eventually, if it's successful, and is not always successful, because it is a very rich type of process, it would end in detection rule. That con as is inline ith the question that benea as asking ovia, as down to what you hunt when we have too much data and logs? A couple of months that came in as well. Abos mentioned the fact that great a hypothesis. Fuss is well, but orts that you wont add to the question from any so it's a great question, and i really agree with the response. It really is thesis based. I mean, regardless st matter how many logs i have, i

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app