Remove de 4-ways-you-can-use-your-secure-collaboration-tool
article thumbnail

Cooking Intelligent Detections from Threat Intelligence (Part 6)

Anton on Security

This blog series was written jointly with Amine Besson, Principal Cyber Engineer, Behemoth CyberDefence and one more anonymous collaborator. TI serves as a key input for detection engineering (DE), the team that directly benefits from its findings. OK, What does DE expect from Intel?

article thumbnail

Cooking Intelligent Detections from Threat Intelligence (Part 6)

Security Boulevard

This blog series was written jointly with Amine Besson, Principal Cyber Engineer, Behemoth CyberDefence and one more anonymous collaborator. TI serves as a key input for detection engineering (DE), the team that directly benefits from its findings. OK, What does DE expect from Intel?

article thumbnail

Black Hat USA 2022: Creating Hacker Summer Camp

Cisco Security

In part one of this issue of our Black Hat USA NOC (Network Operations Center) blog, you will find: Adapt and Overcome. Port Security, by Ryan MacLennan, Ian Redden and Paul Fiddler. This is the only way a community can have trust and grow, together. Building the Hacker Summer Camp network, by Evan Basta.