
Security operations centers: around the Hash Table.
CISO Perspectives (public)
00:00
Using a Socket Team in a Network Defense Environment
Theory developed in white pers and essays smashes at great velocity, head on against the situation in the real world. All the hash table members that i talk to about their sock operations have embraced the idea of audimenting their repetitive sock tasks. I wouldn't call it a def secop's adoption across the board, but most believe that more sock adomation is a no brainer.
Transcript
Play full episode