Attackers borrow IP addresses, but they control domains. Learning to assess those domain names reveals intent. Unlock the power of identifying underlying domain names and using them to pivot in a way that gives you the upper hand during an investigation or response. Join Michael and Paul as they explore using domain names and DNS information in a candid discussion with Taylor Wilkes-Pierce from DomainTools. We’ll deep-dive into one of 2017's most notorious phishing attacks to show you how to use domain data and pivoting to profile threat actors and prevent future attacks.