Threat Hunting March 7, 2018 When Blocking and Tackling Strategies Fail, Take a Page Out of the Threat Hunting Playbook 3 min read - Many organizations still rely on reactive blocking and tackling strategies, but proactive threat hunting is the only way to detect the type of chatter that is indicative of an impending attack.
Threat Hunting December 12, 2017 Threat Hunters Hansel and Gretel Keep the Forest Safe 2 min read - Thanks to their harrowing experience with the Evil Witch, Hansel and Gretel went on to become expert threat hunters to protect the children of the forest.
Incident Response November 2, 2017 Diving Deeper to Understand, Investigate and Mitigate Cyberthreats 2 min read - Investigative analysis tools enable SOC teams to proactively hunt for and mitigate cyberthreats instead of meticulously collecting and curating data.
Risk Management September 6, 2017 Know Your Data and Your Enemies: Establishing a Baseline for Proactive Threat Hunting 3 min read - Threat hunting enables security teams to improve incident response speed and accuracy. It also empowers them to remediate threats proactively.
Network August 30, 2017 Keep Intruders Out of Your Network With Proactive Threat Hunting 3 min read - Threat hunting promotes a proactive approach to security monitoring and incident response, making it harder for intruders to breach your network.
Risk Management August 23, 2017 Blindfolded on the Battlefield: The Importance of Threat Hunting in the Modern Age 3 min read - To keep up with today's advanced cybercrime landscape, security professionals must take a proactive approach to threat hunting and incident response.
Threat Hunting August 7, 2017 Threat Hunting Services Are Now a Basic Necessity 4 min read - EDR solutions enable threat hunting teams to fine-tune behavioral detection rules and determine the techniques by which malware spreads through a network.
June 20, 2017 IBM i2 QRadar Offense Investigator: The New i2 Cyber Threat Hunting App 2 min read - The all-new IBM i2 QRadar Offense Investigator makes it easier for cyberanalysts to gather and pinpoint data trends regarding vulnerabilities and threats.
Threat Hunting March 21, 2017 Understanding Cyber Threat Hunting 3 min read - When implementing threat hunting programs for the first time, IT teams should start with basic concepts, then add more capabilities gradually.