HomeVulnerabilityIdentification assaults have modified — have your IR playbooks?

Identification assaults have modified — have your IR playbooks?

Webinar | August thirteenth & 14th 2025

Identification assaults have modified — have your IR playbooks?

How identification assaults have developed from the times of AD assaults.

What investigation and response used to appear like, and the challenges that trendy identification brings to conventional instruments and processes.

Step-by-step walkthrough of utilizing the Push platform to research and reply to trendy identification assault eventualities, from analyzing the timeline of a browser-based phishing assault, to investigating the blast radius of a compromised identification.

Automations and use-cases that Push clients have constructed utilizing browser telemetry to detect and reply to assaults and remediate identification vulnerabilities.

Josh GideonProduct Staff

See also  Kaspersky Hyperlinks Head Mare to Twelve, Focusing on Russian Entities through Shared C2 Servers
- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular