Threat Hunting is proactive hunting or searching through networks, endpoints, and datasets to find malicious, suspicious, or risky activity, patterns, or files that evaded existing detection tools. This is different from threat detection which is a passive, reactive approach to monitoring data and systems for potential security issues. Proactive cyber threat hunting tactics can use new threat intelligence on previously collected data to identify and categorize potential threats retroactively and possibly head off a current or future breach.
Defense-in-depth security programs combine passive detection systems with active threat hunting to provide the greatest chance of attack discovery. Threat hunting develops attack scenarios based upon reported or observed threat actor behaviors and validates those theories against SIEM databases, log files, and observed activities across ones computing systems and networks.
With threat hunting, security professionals look at their data sources not for standard alerts but with deeper reasoning and forensics. In some cases, the threat hunter’s substantiate alerts previously ignored or treated as false-positives.
Threat hunting is a tool that can improve your cybersecurity but it can be expensive. It is often reserved for highly mature organizations with a proliferation of Advanced Persistent Threats. If it’s not in your budget, a risk assessment is a great way to determine gaps in your cybersecurity program. Once you’ve determined your gaps, you can plan how to spend your finite time and money addressing them. CyberHoot recommended your risk assessment examine whether you’re doing the following best practices:
https://www.youtube.com/watch?v=MvH_GqkFmus
Sources:
Additional Reading:
MSPs Should Require Risk Assessments
U.S.S.S. Reporting Increase in SMBs Hacked
Related Terms:
Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.
Stop tricking employees. Start training them. Take Control of Your Security Awareness Training with a Platform...
Read moreA recent discovery by cybersecurity firm Oligo Security has unveiled a series of critical vulnerabilities in...
Read moreGet sharper eyes on human risks, with the positive approach that beats traditional phish testing.