Introduction
-
Attackers are sophisticated and design threats to evade traditional prevention and detection methods. In many breaches, the attacker has been inside the organization’s environment for months on end.
-
Threat hunting is the discovery of malicious artifacts, activity or detection methods not accounted for in passive monitoring capabilities. Essentially, threat hunting is the process of identifying unknown threats that otherwise would be hiding in your network and on your endpoints, stealing sensitive data.
