Building effective threat detection engineering programs | Very Important Questions

Learn threat detection engineering best practices from experts. Discover how to build better detections and improve SOC efficiency.

Account takeover detection: How we defended against an insider threat | SOC Bytes

Hear how our SOC detected an account takeover attack before it escalated. Real-world insights on identifying compromised accounts.

Roundtable | On Scattered Spider and the Atlas Lion threat group

Experts discuss the Atlas Lion threat group, a Scattered Spider subset, its innovative cloud attacks, and how to defend against their tactics.

Inside an investigation: compromised AWS access keys

Hear how we caught an attacker that used a developer’s machine to gain access to AWS.