How security vendors are aiding Ukraine
CSO Magazine
MARCH 2, 2022
These include scanning of Microsoft Azure Active Directory (AD), Microsoft 365 and AWS environments for signs of attack, surveillance of network infrastructure both in the cloud and on-premises and supporting the retention of historical metadata to aid incident response investigations based on indicators of compromise for specific attack variants.
Let's personalize your content