Blueprint: Build the Best in Cyber Defense cover image

Strategy 7: Select and Collect the Right Data

Blueprint: Build the Best in Cyber Defense

00:00

The Different Types of Signatures in Intrusion Detection

Nearly every attack is going to be eliminated by that set of logs in some way, even if you don't know what specific attack you might be looking for. The next section was about intrusion detection and just kind of the different approaches with different types of rules. So I definitely encourage everyone listening to go read through this chapter because there's a lot more meat that we're going to be able to cover in one episode here.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app