Pulsedive Blog
  • Home
  • Platform
  • FAQs

case study

A collection of 5 posts
Enriched, real-time phishing management
case study Featured

Enriched, real-time phishing management

Case Study: BSI's "PhishQueue" service leverages Pulsedive's Enterprise TIP to help clients detect, investigate, and defend against phishing attacks.
Jan 20, 2023 5 min read
Operationalizing Cyber Threat Intelligence in a Managed SOC
case study

Operationalizing Cyber Threat Intelligence in a Managed SOC

Case Study: Ingalls Information Security strategically develops their cyber threat intelligence program with Pulsedive solutions - all while scaling the SOC more than 10x over 2 years
Mar 3, 2022 4 min read
Hunting in The Home Lab: Putting Cyber Threat Intelligence into Practice
threat intelligence

Hunting in The Home Lab: Putting Cyber Threat Intelligence into Practice

Case Study: Arch Cloud Labs implements hobbyist-friendly solutions like Pulsedive Community and Pro to research, track, and share wide-ranging personal security projects, from investigating cryptojacking malware actors to hunting for CVEs.
May 25, 2021 5 min read
When a Registrar Tackles DNS Abuse Head-On
case study

When a Registrar Tackles DNS Abuse Head-On

Case Study: Realtime Register takes the lead in developing threat intelligence-driven monitoring and mitigation of domain abuse
May 13, 2021 5 min read
Elevating Brazil’s Community Cyber Threat Intelligence
pulsedive

Elevating Brazil’s Community Cyber Threat Intelligence

Case Study: OpenCTI.BR leverages Pulsedive, enhanced with Pro to research, analyze, and combat regional cyber threats
Apr 7, 2021 3 min read
Page 1 of 1
Pulsedive Blog © 2023
  • Twitter
  • LinkedIn
  • About
Powered by Ghost