
Sign up to save your podcasts
Or
Gauging the risk of billions of data objects—URLs, IPs, apps, etc.—requires context. In this episode, OpenText's Cathy Yang explains how the Webroot Threat Investigator tool allows threat hunters to focus on the relationships between data points, gathered by real-word sensors, to create more actionable threat intelligence.
Gauging the risk of billions of data objects—URLs, IPs, apps, etc.—requires context. In this episode, OpenText's Cathy Yang explains how the Webroot Threat Investigator tool allows threat hunters to focus on the relationships between data points, gathered by real-word sensors, to create more actionable threat intelligence.