Podcast: Infrastructure Hunting – Stopping Bad Actors in Their Tracks
Being able to effectively build a threat intelligence ecosystem or threat-hunting identification response requires both user and systems sophistication and capabilities. Security, orchestration, automation and response (SOAR) is a new technology designed to provide organizations a single comprehensive platform they can use to implement an intelligence driven security strategy.
Welcome to another SecurityNow podcast. In today's edition, we're going to be discussing threat intelligence. How much context is enough to make a decision or to make decisions? Our guest today is Kyle Ehmke from ThreatConnect. He's a senior threat intelligence researcher with ThreatConnect with more than ten years' experience. Ehmke has followed a range of cyber threats from the Middle East and extremists, to those specifically affecting the healthcare sector all the way to Russian activity targeting Bellingcat, WADA and others. Ehmke specifically focuses on generating and using infrastructure research methodologies to build out and better understand actors' domain and IP assets.
Stay up to date on NEW SecurityNow Content like news, podcast interviews from the front lines, instructive webinars and in-depth topical eBooks by registering here for our weekly SecurityNow Debrief
This podcast was brought to you by ThreatConnect. Designed by analysts but built for the entire team, ThreatConnect's intelligence-driven security operations platform is the only solution available today with intelligence, automation, analytics, and workflows in a single platform. Want to learn more? Check out their newest eBook, SOAR Platforms: Everything you need to know about security, orchestration, automation, and response. The eBook talks about intelligence-driven orchestration, decreasing time to response and remediation with SOAR, and ends with a checklist for a complete SOAR solution. Download it at www.threatconnect.com/soar
Related posts:
— Dan Reis, Expert Analyst, SecurityNow
Read more about:
Security NowAbout the Author
You May Also Like