Threat Hunting Masterclass: Three data science notebooks for finding bad actors in your network logs

Posted by Graphistry Staff on May 13, 2019

Welcome to the inaugural Graphistry masterclass! In our first session, we dig into hunting over encrypted network activity with Zeek logs, Graphistry visualization, and Jupyter Notebooks with special guest Chit from Corelight.

Read More