In the blog post “SCIM Hunting,” the author explores the Security Assertion Markup Language (SAML) and System for Cross-domain Identity Management (SCIM) protocols, which are essential for managing user identities and access in cloud environments. For someone new to IT, understanding these protocols is crucial, as they play a significant role in ensuring secure access Read More …
Tag: threat hunting
Conference Video – Automating Malware Analysis for Threat Intelligence
These are the videos from B Sides Augusta 2016:
Conference Video – Threat Hunting Within Organizations Andrew Case
These are the videos from B Sides Tampa 2015