Linux Threat Hunting Tactics and Techniques vs Signatures
>> YOUR LINK HERE: ___ http://youtube.com/watch?v=An3oGN4Wnrs
Threat hunting on Linux is most effective looking for tactics and techniques vs. traditional malware signatures. In this video, Sandfly founder Craig Rowland discusses the differences in relation to log tampering for anti-forensics on Linux. • Be sure to subscribe and follow us: • https://www.sandflysecurity.com • / sandflysecurity • / sandfly • / sandflysec
#############################