-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating

Cybersecurity Blue Team Strategies
By :

As the name implies, threat hunting is a practice designed to assist you in finding adversaries within your network. The intention here is to try and look for any compromise proactively rather than waiting for an alert to be raised by the SOC. This helps avoid fire-fighting situations and to try and stop the attackers as early as possible.
It is important to note that a threat hunt is an activity that is quite different from a Digital Forensics and Incident Response (DFIR) activity. An imperative aspect of DF/IR methodologies is their ability to evaluate what happened in the event of a data breach after it has already been discovered. When, on the other hand, a threat hunting team engages in the task of threat hunting, they are looking for those attacks that may have already penetrated your defenses but may or may not have led to an impact on your organization. The threat hunting strategy differs from most other forms of security management in that it is a proactive...
Change the font size
Change margin width
Change background colour