Advanced Continual Threat Hunting involves human-led threat hunting for indicators of behavior (IoB) or tactics, techniques, and procedures (TTPs) from known threat actors or other anomalous activity—looking for attackers that have evaded detection by modern security technology.
Examples of Threat Hunting; analyzing log data for abnormalities, conducting network scans, or using intelligence feeds. The primary goal of threat hunting is to quickly detect and pinpoint potentially malicious behavior that other forms of security might miss
We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.