Find out how to utilize goodware hashes in your security workflows, and how they can be beneficial!
https://medium.com/p/61da19c65528