Go Off Script with Expel. Check out our new webcast.
We got a lot of questions about configuring Jupyter notebooks after presenting at Infosec Jupyterthon 2020. See our response along with some tips for incorporating this tech into infosec processes.
So you decided you want to build a threat hunting program ... but where do you start? Here are our three must-dos when you’re planning your hunt.