The Importance of Effective Correlation for Threat Intelligence Users Jonathan Zhang September 27, 2019 It’s one thing to ensure that all of the possible threat entry points are covered by an organization’s security infrastructure, it’s another to ensure proactive protection.Read More
Is Hacking Back with WHOIS a Good Idea? Jonathan Zhang July 19, 2019 Ever heard the term “hack-back”? Hacking back is the process of identifying attacks on a system and their origin.Read More