Security teams often spend time sorting through logs and alerts that point to activity happening outside corporate networks. Torrent traffic shows up in investigations tied to policy violations, insider risk, and criminal activity. A new research paper looks at that same torrent activity through an open source intelligence lens and asks how much signal security teams can extract from data that is already public. Data pipeline design Turning torrent metadata into intelligence Torrent files contain … More →
The post What security teams can learn from torrent metadata appeared first on Help Net Security.
http://news.poseidon-us.com/TQHn6j

