Threat Hunting Process
In fact, this very premise is the basis of threat hunting — the process of looking for anomalies within a company’s network or devices and determining if they represent the trails left by stealthy attackers. As expected, this is no simple task; hunting for cybercriminals will require an experienced team, lots of data (such as logs from network devices, servers and endpoints), a solution for centralizing data collection and analysis, and actionable knowledge about threats to an environment....