
The OSINT revolution: How cyber and physical security teams are leveraging open source intelligence. [CyberWire-X]
CyberWire Daily
00:00
Is There an Infrastructure That the Bad Guys Use to Do These Influence Operations?
There is an infrastructure that the bad guys use to do these influence operations. And it sort of overlaps with what we cover in the minor attack framework. So there'd be certain things that a network defender could do to prevent that kind of thing from showing up on their users equipment. You can identify user IDs from social media, you know, form your employees that these are disrepetal people,. We could do those kinds of things.
Play episode from 13:04
Transcript


