VIDEO
Case Study: Using Flow Records, Logs & Upload Connections to Understand a Cyberattack
Video Summary:
Industry expert Matt Durrin gives insight into a cyberattack on an employment verification service in this case study. Learn how the team used flow records, logs, and upload connections to determine how the attackers infiltrated the systems, how much access they gained, and what laws, regulations, or contracts related to the incident.
Industry expert Matt Durrin gives insight into a cyberattack on an employment verification service in this case study. Learn how the team used flow records, logs, and upload connections to determine how the attackers infiltrated the systems, how much access they gained, and what laws, regulations, or contracts related to the incident.