2min chapter

Cloud Security Podcast cover image

Threat Hunting in AWS

Cloud Security Podcast

CHAPTER

Cloud Security

In an interrative process that eventually, if it's successful, and is not always successful, because it is a very rich type of process, it would end in detection rule. That con as is inline ith the question that benea as asking ovia, as down to what you hunt when we have too much data and logs? A couple of months that came in as well. Abos mentioned the fact that great a hypothesis. Fuss is well, but orts that you wont add to the question from any so it's a great question, and i really agree with the response. It really is thesis based. I mean, regardless st matter how many logs i have, i

00:00

Get the Snipd
podcast app

Unlock the knowledge in podcasts with the podcast player of the future.
App store bannerPlay store banner

AI-powered
podcast player

Listen to all your favourite podcasts with AI-powered features

Discover
highlights

Listen to the best highlights from the podcasts you love and dive into the full episode

Save any
moment

Hear something you like? Tap your headphones to save it with AI-generated key takeaways

Share
& Export

Send highlights to Twitter, WhatsApp or export them to Notion, Readwise & more

AI-powered
podcast player

Listen to all your favourite podcasts with AI-powered features

Discover
highlights

Listen to the best highlights from the podcasts you love and dive into the full episode