Visual Hunting With Linked Data

Visual Hunting With Linked Data

Use open source tools to identify and exploit the inherent links in your Network Security Monitoring (NSM) to visually hunt for evil in your network.

As presented at RVASec 2015.

49d635b47da1fee5d0972745390e0633?s=128

David J. Bianco

June 05, 2015
Tweet