Threat hunting is the practice of proactively searching for cyber threats that are lurking undetected in a network. Cyber threat hunting digs deep to find malicious actors in your environment that have slipped past your initial endpoint security defenses.
Threat intelligence is data that is collected, processed, and analyzed to understand a threat actor’s motives, targets, and attack behaviors. Threat intelligence enables us to make faster, more informed, data-backed security decisions and change their behavior from reactive to proactive in the fight against threat actors.
Discover our recommended podcast to listen about Threat Hunting
Join the team behind each month’s WatchTower Report as they discuss the latest novel attacker techniques, global APT campaigns, and threat actors in cybersecurity.
Try to prevent what you can, detect what you can’t prevent and hunt for what you can’t detect.
For this episode about threat hunting, Robby is joined by Andreas Bråthen, Team Lead for threat hunting at mnemonic. Andreas has worked on mnemonic’s threat hunting program for the past three years and shares some of his insights into why the threat hunting domain is so difficult to navigate, and how he defines this somewhat abstract term.
What to Expect
Hands-On Security covers major global cyber events, industry trends, and key detection and response challenges from the point of view of security practitioners. Every month, we’ll host a security expert to brainstorm security strategies, provide tips for preventing future intrusions, and discuss workflows for security teams. We will not hesitate to get tactical, using terms like “kernel” and “man-in-the-middle.”
It’s 5 O’SOC Somewhere, with ThreatConnect provides commentary on a variety of cybersecurity topics, mostly focusing on what’s going on within the world of threat intel and security operations. Episode 4 focuses on threat hunting; defining it, explaining it, and talking about tools that will help you be successful at it. Hear from three members of ThreatConnect’s Research team as they discuss how a security team can get started with threat hunting.
Digital Shadows’ ShadowTalk discusses the latest threat intelligence and cybersecurity news with our panel of threat intelligence experts, security engineers, security researchers, and more
Security Unlocked explores the technology and people powering Microsoft’s Security solutions. In each episode, Microsoft Security evangelists Nic Fillingham and Natalia Godyla take a closer look at the latest innovations in threat intelligence, security research, and data science, with a special focus on demystifying artificial intelligence and machine learning. Be sure to listen in and follow us!
Security Conversations covers the business of cybersecurity, from the lens of veteran journalist and storyteller Ryan Naraine. Thoughtful conversations with security practitioners on threat intelligence, zero trust, securing cloud deployments, penetration testing, bug bounties, advancements in offensive research and targeted malware espionage activity.
Connect with Ryan on Twitter (Open DMs).