<img alt="" src="https://secure.hiss3lark.com/173130.png" style="display:none;">

Datashield's Resource Library

Read all of our news, articles, reviews, and more in our company blog

RSA NetWitness: UEBA Overview

  The era of individual threat actors has been replaced by organized syndicates utilizing sophisticated processes to break through expansive networks and IT architecture.

How a SOC Handles Credential Harvesting

By Nick Sandin, Security Analyst and contributing author Brandon Doty, SOC Manager Dealing with credential harvesters has its perks. Day in and day out I get to personally observe how sophisticated a phishing website can be. Some websites are so elaborate that only a trained analyst can identify them, while others are so obvious no one in their right mind would fall for it. Either way, if it looks suspicious just follow the “POST”.

    Related Posts