Description: Previously on Logs and Tactical Defence (https://youtu.be/f48lOuHmVxI), we outlined a few simple recipes to detect questionable activity, determine the attackers' intent, and respond in traditional and novel ways. In this presentation, we will detail some new recipes, show some interesting failure modes for some of the old ones, and discuss the operational overhead of running such a system.
For More Information Please Visit:- http://www.bsidesto.ca/
Tags:
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.