Subscribe to DSC Newsletter

Cyber Security Analysis - Part 3 - Centrifuge Systems

This 5 minute video shows cyber analysts how they can integrate 3rd party data using Centrifuge 2.0. See how you can turn suspicious network traffic into real contact information for the investigation. Learn how to apply advanced link analysis to pinpoint your investigation.

Views: 85

Comment

You need to be a member of AnalyticBridge to add comments!

Join AnalyticBridge

On Data Science Central

© 2020   TechTarget, Inc.   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service