Abstract illustration

The Power of the Pivot

Attackers borrow IP addresses, but they control domains. Learning to assess those domain names reveals intent. Unlock the power of identifying underlying domain names and using them to pivot in a way that gives you the upper hand during an investigation or response. Join Michael and Paul as they explore using domain names and DNS information in a candid discussion with Taylor Wilkes-Pierce from DomainTools. We’ll deep-dive into one of 2017’s most notorious phishing attacks to show you how to use domain data and pivoting to profile threat actors and prevent future attacks.