Requirements For Effective Threat Hunting
An episode of the InfosecTrain podcast, hosted by InfosecTrain, titled "Requirements For Effective Threat Hunting" was published on January 27, 2023 and runs 5 minutes.
January 27, 2023 ·5m · InfosecTrain
Summary
Threat Hunting is a proactive technique used by security analysts to identify the undetected, unfamiliar, or non-remediated threats in the organization’s network. It includes iterative methods to identify Indicators of Compromise (IoCs) threats, such as Advanced Persistent Threats (APTs) and Hacker Tactics, Techniques, and Procedures (TTPs) that can exploit the existing system. Types of Threat Hunting Threat Hunting involves a deep investigation to identify potential threats in the organization’s network. The following are the three different types of Threat Hunting: Read More: Requirements For Effective Threat Hunting
Episode Description
Threat Hunting is a proactive technique used by security analysts to identify the undetected, unfamiliar, or non-remediated threats in the organization’s network. It includes iterative methods to identify Indicators of Compromise (IoCs) threats, such as Advanced Persistent Threats (APTs) and Hacker Tactics, Techniques, and Procedures (TTPs) that can exploit the existing system.
Types of Threat Hunting
Threat Hunting involves a deep investigation to identify potential threats in the organization’s network. The following are the three different types of Threat Hunting:
Read More: Requirements For Effective Threat Hunting
Similar Episodes
No similar episodes found.
Similar Podcasts
No similar podcasts found.