improve threat resolution cycles by leveraging dns
S and amp;R leaders use DNS data throughout investigations for correlating network logs, determining exposure, and examining outbound resources.
Using internal DNS as a security control point drive...