Insider Threat Hunting with Datadog and CrowdStrike
Tutorials

Insider Threat Hunting with Datadog and CrowdStrike

Rarely are all the elements for confident decision making located in a single silo, repository, or team. Equally, security patterns that are mandated for accessing disparate or remote data sources may be a mixture of 'push' or 'pull' depending upon the boundaries, zones, or enclaves to be crossed.

Donal O Duibhir
Donal O Duibhir
Security Engineering, Tines