Welcome to the inaugural Graphistry masterclass! In our first session, we dig into hunting over encrypted network activity with Zeek logs, Graphistry visualization, and Jupyter Notebooks with special guest Chit from Corelight.
Threat Hunting Masterclass: Three data science notebooks for finding bad actors in your network logs
Posted by
Graphistry Staff on
May 13, 2019