Playbook Series: Automatically Secure Compromised Accounts

Today’s post continues an ongoing series on Playbooks; which Phantom uses to automate and orchestrate your security operations plan. Flashpoint gives their threat intelligence subscribers the ability to see compromised user names, passwords, email addresses, and other credentials.  This information can be ingested daily and distributed over email. When an analyst receives an email from … Continue reading Playbook Series: Automatically Secure Compromised Accounts