What Red Canary Detects, Part I: Overview & Malicious Software

We want every detection that we produce to result in action. Actions are organization-specific and may include remediation, investigation, or simply a discussion related to configuration management. In this series we examine what Red Canary detects in the context of theĀ classifications used to describe and group these threats for our customers. The primary purpose of […]