A brief on the status of threat hunting today
Overview of how MITRE ATT&CK is used in threat hunting
Play by play of how threat intelligence and cyber deception works to solve 8 of threat huntings’ most pressing issues