How to add threat hunting capabilities into your playbook

Cover Image

The rise of the threat hunter role is butting up against the skills shortage. As more companies start to adopt security automation, the threat hunting process steps outside of the box by requiring a highly trained human element.

The threat hunting process hinges on an expert’s ability to create hypotheses and to hunt for patterns and indicators of compromise in data-driven networks.

In this issue of Information Security, explore learn how threat hunting programs can find security holes that machine learning or automated systems fail to detect.

Vendor:
TechTarget Security
Posted:
Feb 8, 2021
Published:
Feb 12, 2019
Format:
PDF
Type:
Ezine
Already a Bitpipe member? Log in here

Download this Ezine!