How to Use Workflow to Conduct Phishing Analysis Part 2 – Automating Phase 1

tc-favion.pngHow to Use Workflow to Conduct Phishing Analysis Part 2 – Automating Phase 1>
Threat Connect Blog – Marika Chauvin And Richard Cody
In part 1 of this series, How to Use Workflow to do Phishing Analysis Part 1 â Defining the Process, we discussed the steps one might take to define an organizationâs phishing analysis process in ThreatConnectâs Workflow feature and provided a template that could be used as a guide.

In this post, we will discuss how to automate some of the more manual parts of phishing analysis in the hopes that it helps save you some time and gives you some ideas for where you might be able to use Playbooks within Workflow.
Link: https://threatconnect.com/blog/how-to-use-workflow-to-conduct-phishing-analysis-part-2-automating-phase-1/


Categories:

Tags: