Security Automation Tour

How our own SOC uses automation to hunt threats