Top
item
image credit: Pixabay

How to Set Up a Threat Hunting and Threat Intelligence Program

May 8, 2023

What is Threat Hunting?

The cybersecurity industry is shifting from a reactive to a proactive approach. Instead of waiting for cybersecurity alerts and then addressing them, security organizations are now deploying red teams to actively seek out breaches, threats and risks, so they can be isolated. This is also known as “threat hunting.”

Why is Threat Hunting Required?

Threat hunting complements existing prevention and detection security controls. These controls are essential for mitigating threats. However, they are optimized for low false positive alerting. Hunt solutions, on the other hand, are optimized for low false negatives. This means that the anomalies and outliers that are considered false positives for detection solutions, are hunting solutions’ leads, to be investigated.

Read More on The Hacker News