Written by Guest Author

Card image cap

AI-based Identity Analytics

by Guest Author | a month ago

Few security teams pay sufficient attention to their Kerberos infrastructure – often citing its protocol complexity, as well as its operational ownership by IT. Despite the variety of telemetry being collected to your SIEM, you might be missing juicy stuff inherent in Kerberos-related activity.

READ MORE