Threat Hunting

December 11, 2017
Is Your Agency Ready for the Threat Hunt? premium
Targeted campaigns by malicious actors have become commonplace. As recent breaches show, these threat actors can stay hidden on agency networks for long periods of time, assessing your systems and looking for information to exfiltrate. We call them the enemy with no face. Take the OPM breach, for example. Hackers first entered the system in […]
premium
Government Tech Writer
October 11, 2017
Threat Hunting and Your SIEM: 10 Reasons Why You Need Both premium
I bet there was a time you loved your security information and event management (SIEM) system. This central location for managing all the security events on your network. But, as good as it may seem, many IT organizations have a love/hate relationship with their SIEM. Less than 25% of security professionals are getting full value […]
premium
Government Tech Writer
September 25, 2017
The Need for Advanced Threat Hunting premium
The 2017 DefCon conference featured former World Chess Champion Garry Kasparov, who spoke about artificial intelligence, computers, and of course, chess.  After losing a match to a purpose-built computer in 1997, Kasparov realized that the machine, although it had beaten him, was not truly intelligent:  it had simply out-calculated him, by examining over 200 million […]
premium
Don Maclean
Chief Cyber Security Technologist
April 6, 2017
The State of Threat Hunting in the 2017 SOC premium
While much of the focus on cybersecurity risks has been focused on prevention and detection, many organizations are quickly discovering that threat hunting is the next step in the evolution of their security operations center (SOC). In 2017, the Information Security Community on LinkedIn conducted an online research project (supported by DLT partner, Sqrrl) to […]
premium
Government Tech Writer
January 12, 2017
Threat Hunting – Finding and Thwarting Mr. Robot premium
The concepts of threat hunting and threat intelligence went mainstream in 2016 bringing with it a whole new paradigm to threat mitigation and cybersecurity. But what is threat hunting and what use cases does it serve? As cyber-attacks become more sophisticated, today’s security teams need to adapt a more proactive role in detecting and responding […]
premium
Government Tech Writer
December 21, 2016
Supercharge Your SIEM with Threat Hunting premium
Security Information Event Management (SIEM) tools have been around for quite some time. SIEMs are great for aggregating log files, parsing them, and using real-time correlation rules to spot security incidents. But more advanced incidents can evade detection by your SIEM. Finding those evasive threats becomes a lot easier if you employ threat hunting. Threat […]
premium
Government Tech Writer
August 4, 2016
Using Threat Hunting to Protect “Swiss Cheese” Security Infrastructures premium
As another high profile government leak hits the headlines in the wake of the Democratic National Convention (DNC), the focus on developing a more proactive security posture through threat hunting, not just remediation, has never been greater. “The DNC and the RNC have been Swiss cheese in terms of their security,” Wikileaks’ Julian Assange, told […]
premium
editor@acronymonline.org'
August 3, 2016
Close the Gap between Threat Detection and Response with User and Entity Behavior Analytics premium
Could user and entity behavior analytics (UEBA) be the missing piece of the puzzle that security teams have been waiting for in their bid to outmaneuver threat actors? As the average amount of time passed to identify data breaches caused by malicious attacks reaches staggering proportions (265 days) and the mean amount of time to […]
premium
editor@acronymonline.org'
July 12, 2016
Where Does your Agency Stand on the Cyber Threat Hunting Maturity Model? premium
Many organizations are quickly discovering that cyber threat hunting is the next step in the evolution of the modern Security Operations Center (SOC). But what is “hunting”? Sqrrl, a leader in big data analytics and cybersecurity, defines hunting as “the process of proactively and iteratively searching through networks to detect and isolate advanced threats that […]
premium
ali.glossner@dlt.com'

Privacy Preference Center

Close your account?

Your account will be closed and all data will be permanently deleted and cannot be recovered. Are you sure?

Are you sure?

By disagreeing you will no longer have access to our site and will be logged out.