Blueprint: Build the Best in Cyber Defense cover image

Strategy 6: Illuminate Adversaries with Cyber Threat Intelligence

Blueprint: Build the Best in Cyber Defense

00:00

The Difference Between Association and Attribution in Security Operations

Most SOCs don't need to know, hey, it was this particular person behind the keyboard sitting in this city or country. But what you do need to know is, hey,. it was likely this group or this piece of malware or this particular thing. And again, the actions that you can take based on that or what you should be looking for in the database on it.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app