Logo video2dn
  • Сохранить видео с ютуба
  • Категории
    • Музыка
    • Кино и Анимация
    • Автомобили
    • Животные
    • Спорт
    • Путешествия
    • Игры
    • Люди и Блоги
    • Юмор
    • Развлечения
    • Новости и Политика
    • Howto и Стиль
    • Diy своими руками
    • Образование
    • Наука и Технологии
    • Некоммерческие Организации
  • О сайте

Скачать или смотреть Stop Paying for Domain Feeds: Build Your Own Threat Intel - Stephen Doyle

  • BSides Belfast
  • 2025-12-12
  • 30
Stop Paying for Domain Feeds: Build Your Own Threat Intel - Stephen Doyle
bsidesbelfastbsidesbelfast25securitybsidesbsidesinfoseccybersecurityconferencebelfastnorthern ireland
  • ok logo

Скачать Stop Paying for Domain Feeds: Build Your Own Threat Intel - Stephen Doyle бесплатно в качестве 4к (2к / 1080p)

У нас вы можете скачать бесплатно Stop Paying for Domain Feeds: Build Your Own Threat Intel - Stephen Doyle или посмотреть видео с ютуба в максимальном доступном качестве.

Для скачивания выберите вариант из формы ниже:

  • Информация по загрузке:

Cкачать музыку Stop Paying for Domain Feeds: Build Your Own Threat Intel - Stephen Doyle бесплатно в формате MP3:

Если иконки загрузки не отобразились, ПОЖАЛУЙСТА, НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если у вас возникли трудности с загрузкой, пожалуйста, свяжитесь с нами по контактам, указанным в нижней части страницы.
Спасибо за использование сервиса video2dn.com

Описание к видео Stop Paying for Domain Feeds: Build Your Own Threat Intel - Stephen Doyle

Security teams often rely on third-party domain feeds; passive DNS, CT logs, and threat intelligence subscriptions to monitor malicious infrastructure. But these feeds are usually lagging, noisy, and offer the same surface-level data to everyone. The assumption is, building something better is too hard. This talk challenges that assumption.

It’s a practical walkthrough of how to build your own lightweight, open-source pipeline to monitor the web for domain-based threats on your terms, and without handing money or trust to vendors.

The talk covers how to scan, resolve, enrich, and analyze domains at scale using open tools and on-prem infrastructure. You’ll learn how to collect the kinds of intelligence that threat feeds miss; misconfigured web stacks, malicious redirect chains, third-party script abuse, phishing infrastructure, and newly deployed shady domains.

Topics include:
Why paid feeds are limited (and often outdated)

How to extract high-signal data directly from the web: DNS, TLS, HTTP, headers, and third-party resources

Tools and techniques to crawl and map domains yourself

Building an on-prem enrichment and storage pipeline

Real-world examples of strange, fragile, or dangerous architectures discovered in the wild

You’ll also hear lessons learnt from monitoring large parts of the web continuously, and why many domains break in surprising, insecure ways, often depending on dozens of external services just to render a login page.

It’s a talk for engineers, defenders, and curious hackers who like building things and want to see more of the web for themselves. If you've ever thought, “Why am I paying for this feed when I could just scan it myself?” then this talk is for you.

The goal is simple: empower others to stop outsourcing visibility, start building smarter, and gain more meaningful threat intelligence, on your own terms.

#bsidesbelfast25 #securitybsides #bsidesbelfast #bsides

Комментарии

Информация по комментариям в разработке

Похожие видео

  • О нас
  • Контакты
  • Отказ от ответственности - Disclaimer
  • Условия использования сайта - TOS
  • Политика конфиденциальности

video2dn Copyright © 2023 - 2025

Контакты для правообладателей [email protected]