
Cyber Threat Intelligence
Secure Talk Podcast
00:00
How Does Your Service Collection Work?
At the heart of our technology and really the heart of what we do and do well I would say although I'm biased as a company is we develop collection methods. So before we have fancy user interfaces and APIs that allow our users to do stuff, really the core technology is collectors,. Fully automated collectors that we've been building for about eight years now since we started doing separate threat intelligence. On top of that we have structuring and processing of the data to extract observables from it and to extract and mine entities from it and from there we have detection.
Play episode from 26:20
Transcript


