Incident detection & response
Building effective threat detection engineering programs | Very Important Questions
Learn threat detection engineering best practices from experts. Discover how to build better detections and improve SOC efficiency.
Account takeover detection: How we defended against an insider threat | SOC Bytes
Hear how our SOC detected an account takeover attack before it escalated. Real-world insights on identifying compromised accounts.
Roundtable | On Scattered Spider and the Atlas Lion threat group
Experts discuss the Atlas Lion threat group, a Scattered Spider subset, its innovative cloud attacks, and how to defend against their tactics.
Inside an investigation: compromised AWS access keys
Hear how we caught an attacker that used a developer’s machine to gain access to AWS.
