| |||||
| |||||
Search Irongeek.com:
Help Irongeek.com pay for bandwidth and research equipment: |
How do you identify and quantify adversary activity in one of
the largest data sets in InfoSec? If you are a member of the
APG you lay your hands on every bit of threat data you can
and then develop massive search, correlation and machine
learning capabilities on top of it, underneath it and behind
it. Dave Marcus will share what the APG is doing with large
data set analysis, threat correlation and pivoting to better
identify and quantify real adversary activity.
15 most recent posts on Irongeek.com:
|
If you would like to republish one of the articles from this site on your
webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast