CISO Perspectives (public) cover image

Security operations centers: around the Hash Table.

CISO Perspectives (public)

00:00

Using a Socket Team in a Network Defense Environment

Theory developed in white pers and essays smashes at great velocity, head on against the situation in the real world. All the hash table members that i talk to about their sock operations have embraced the idea of audimenting their repetitive sock tasks. I wouldn't call it a def secop's adoption across the board, but most believe that more sock adomation is a no brainer.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app