Requirements For Effective Threat Hunting

InfosecTrain - A podcast by InfosecTrain

Categories:

Threat Hunting is a proactive technique used by security analysts to identify the undetected, unfamiliar, or non-remediated threats in the organization’s network. It includes iterative methods to identify Indicators of Compromise (IoCs) threats, such as Advanced Persistent Threats (APTs) and Hacker Tactics, Techniques, and Procedures (TTPs) that can exploit the existing system. Types of Threat Hunting Threat Hunting involves a deep investigation to identify potential threats in the organization’s network. The following are the three different types of Threat Hunting: Read More: Requirements For Effective Threat Hunting

Visit the podcast's native language site