Blueprint: Build the Best in Cyber Defense cover image

Strategy 6: Illuminate Adversaries with Cyber Threat Intelligence

Blueprint: Build the Best in Cyber Defense

00:00

How to Identify and Deal With Adversaries in Your Environment

Starting with your own incident data is probably the best way to start looking at CTI. So are they super, were they hard to find? Were they very sophisticated? Or did they just seem pretty straightforward and easy to deal with? More of a malware kind of thing? Was there ransomware involved?

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app