The Dutch
Security Cluster
 
 
The Dutch
Security Cluster

Threat Hunting: Eight Tactics to a Better Cybersecurity Strategy

One of the bigger headaches I think we can all agree on in the Cyber Security business is the overuse of buzzwords, and the overlapping mutations of what they mean, depending on who’s saying them. Threat Hunting has certainly become one of those phrases. So what is threat hunting, really? Well, depending on who you ask… (i.e., an Enterprise, a Vendor, or perhaps both), that answer can certainly vary. And the interesting thing is none of them may actually be wrong, despite having somewhat different answers to the same question. There is certainly a wide collection of different tools, skill sets, approaches, and processes to help identify things currently happening or that could happen within the network. What is an effective hunting process for one organization may be a waste of time for another, depending on each company’s understanding of what threats they might face. Man-hours spent hunting are typically most beneficial for large organizations, that may be targeted by the cybercriminal community on a regular basis, but that’s not to say that regular hunts for small/medium-sized enterprises can’t benefit from and identify threats by doing the same.

HSD Partners involved