Blog

Identity Threat Defense

Abstract connections
Identity Threat Defense
Matthew Gardiner and Yossi Tamarov
How ITDR and Deceptions Can Defend Against the Exploitation of Software Vulnerabilities
Proofpoint Packages
Identity Threat Defense
Matthew Gardiner
Improving Detection and Response: Making the Case for Deceptions 
Proofpoint Packages
Identity Threat Defense
Laura Hamel  and Matthew Gardiner
Proofpoint Discloses Technique Pivot by Attacker Group TA577: Targeting Windows NTLM