Prototyping CIFv4 - Developing a Threat Intel View using Graphs

You’ve managed to collect all that threat intel.. here’s the easiest way to graph it..
You’ve managed to collect all that threat intel.. here’s the easiest way to graph it..
The single fastest way to get your threat intel out of slack and into your..
Traditional threat intel platforms are being deprecated by this one important feature..
Wouldn’t it be cool, if your IDS could start hunting automatically.. simply by paying attention to your #ops channel?
How to scale your phishing detection to millions of attacks per day- with just $4,000 and a laptop.
While everyone else is trying to rack servers, build API’s, client tools, documentation and billing systems, you’re already way ahead of them, spending the majority of your time hunting…
.. because having to fight for the resources, to keep people from robbing you, is dumb.