The speaker discusses how they were able to successfully identify and understand the steps taken by a group of hackers using specialized tools and teams to detect and respond to malicious activity within their network.
GoodListen © 2023
About
Privacy Policy
Terms of service
Support
Blog
Search Podcasts
Podcasts