Collect data on threat actors from Anomali ThreatStream, then either create or update detection signature security rules in Sublime Security based on the presence of observables and whether rules already exist. If further results appear, repeat the collection and rule management process after a delay.
Dan Le
How it works
Import this story to your tenant, from where you can adapt it to meet your unique needs.
Import