Threat hunting December 3, 2021 Waqas Compromise assessment or threat hunting? What do organizations need? Compromise assessment and threat hunting are two rising techniques of implementing network security. Figure out what your organization needs.
Threat hunting February 15, 2021 Dan Virgillito Deception technologies: 4 tools to help you identify threats and mitigate risks Deception technologies have come a long way from the days when honeypots were used to analyze attacker behavior. Today’s deception tools contain advanced...
Threat hunting August 13, 2019 Lester Obbayi Threat hunting with Kolide and osquery In this article, we’ll discuss how we can use Kolide Fleet for threat-hunting purposes. This article is not intended to be an introductory piece, but rather...
Threat hunting July 31, 2019 Lester Obbayi Threat hunting with osquery In this article, we take a look at osquery and how it can be used to query the security, reliability and compliance information of systems within your network...
Threat hunting June 6, 2019 Lester Obbayi Threat hunting with Cymon API In this article, we’ll discuss mock intrusion attempts on our systems and show you how to make use of Cymon API to query important information that you...
Threat hunting May 9, 2019 Lester Obbayi Threat hunting with Graylog Graylog is a leading centralized log management solution which allows security teams to log, store and analyze huge amounts of data. One area where Graylog...
Threat hunting May 8, 2019 Howard Poston Threat Hunting: Remediation The majority of a threat hunter’s role is looking for the “needle in the haystack” by using a variety of different tools and techniques to look for threats...
Threat hunting May 7, 2019 Howard Poston Threat-hunting techniques: Conducting the hunt Many organizations only perform reactive threat-hunting, searching for threats once it’s obvious that their environment has been compromised. A mature threat-hunting...
Threat hunting February 15, 2019 Mahwish Khan Top 10 Free Threat-Hunting Tools Threat hunting is an alternative approach to dealing with cyber-attacks, compared to network security systems that include appliances such as firewalls that...
Threat hunting November 29, 2018 Lester Obbayi Threat Hunting: Data Collection and Analysis Threat hunting requires proactively looking within the network and searching for anomalies that might indicate a breach. The vast amount of data that needs...