I remember a similar question where we had to choose between adding an IOC in Crowdstrike or Netskope. I feel like this one is leaning towards Crowdstrike too.
Ha! If the malware hash was added as an IOC in Netskope, that would be like trying to catch a fish with a net made of holes. Gotta go with B on this one.
Hmm, I'm not too sure about this one. Isolating the endpoint or quarantining the malware would also make sense. I'll have to think this through carefully.
Alisha
3 months agoShawna
3 months agoLynelle
3 months agoLilli
4 months agoEileen
4 months agoBeckie
4 months agoJohnathon
4 months agoDeonna
4 months agoVinnie
5 months agoIsabelle
5 months agoMarica
5 months agoHillary
5 months agoDevorah
5 months agoMerlyn
5 months agoAn
10 months agoLavera
8 months agoGerardo
8 months agoChan
9 months agoAnjelica
10 months agoNicholle
9 months agoHollis
9 months agoNoemi
9 months agoClement
9 months agoAnisha
9 months agoAntonio
9 months agoLeslee
10 months agoSalome
11 months agoNatalie
9 months agoMayra
9 months agoNatalie
11 months agoEdwin
11 months agoNatalie
11 months ago