Source |
CSO |
Identifiant |
5730876 |
Date de publication |
2022-07-14 16:38:00 (vue: 2022-07-15 00:05:40) |
Titre |
BrandPost: Let\'s Talk About Cloud Threat Hunting |
Texte |
Threat hunting is a proactive approach for finding and remediating undetected cyber-attacks. It is a process that involves searching for indicators of compromise (IoC), investigating, classifying, and remediating. Threat hunting can be IoC-driven, in which the hunter investigates an indicator provided by external or internal sources. It can also be hypothesis-driven, in which the hunt begins with an initial hypothesis or question. For example, have we been affected by a recent campaign covered in the news?It's best to assume you've been compromisedThreat hunting is necessary simply because no cybersecurity protections are always 100% effective. An active defense is needed, rather than relying on “set it and forget it” security tools.To read this article in full, please click here |
Envoyé |
Oui |
Condensat |
100 about active affected also always approach are article assume attacks because been begins best brandpost: campaign can classifying click cloud compromise compromisedthreat covered cyber cybersecurity defense driven effective example external finding forget full have here hunt hunter hunting hypothesis indicator indicators initial internal investigates investigating involves ioc it” let necessary needed news please proactive process protections provided question rather read recent relying remediating searching security simply sources talk than threat tools undetected which you “set |
Tags |
Threat
|
Stories |
|
Notes |
|
Move |
|