Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13
Introduction
00:00 • 5min
The Challenge Put Into Soft Ware Development
04:36 • 5min
Is This a Sore Use Case?
09:40 • 2min
Is Your Network Security Not Blocking That Type of Activity?
11:14 • 3min
Is Sore a Methodology or a Tool?
14:15 • 3min
What Makes This Different Than What We Were Selling as What Sim Was Going to Do for Us?
17:17 • 5min
Using a Playbook to Run a Query?
22:28 • 6min
Socks Weapon Systems
28:16 • 4min
Changing the Name, Change the Perceived Value
31:50 • 2min
The Barrier to Entry Now Is Level Three, Right?
33:30 • 2min
How to Make Security Tools Work Together?
35:39 • 5min
The Webenar Was Not a Dig on Them
41:03 • 4min
Down the Security Rabbit Hole Podcast
44:57 • 2min