From Intel To Action
17:04–18:15 · 71s
Carr details turning firehose threat intel into mapped, automated actions, recalling how a 48-hour patch lag after Hafnium enabled widespread secondary compromises.
17:04–18:15 · 71s
Carr details turning firehose threat intel into mapped, automated actions, recalling how a 48-hour patch lag after Hafnium enabled widespread secondary compromises.
We use cookies to understand how you use our platform and to improve your experience. Click "Accept All" to consent, or "Decline non-essential" to opt out of non-essential cookies. Read our Privacy Policy.