You’ve had a data breach or security incident, and that’s bad news. However, on the bright side, now you have concrete insights into the malicious actors’ tactics, techniques, and procedures (TTPs). Your new insights enable you to look across your enterprise environment for other traces of the malicious actors’ activities since they might use the same or similar TTPs. In other words, you’re ready to go threat hunting, a proactive exercise to look for cyber threats that are going on undetected in an organization. In our scenario, we’ve already experienced a security incident, so threat hunting is not driven by intelligence or information, therefore, it’s known as attack-specific threat hunting.
Already a Subscriber? Log In
Access to this content requires a Premium or Corporate or Vendor plan.