Threat Hunting 101: 8 threat hunts you can do with available resources

Thumb original uk uws threat hunting 101 white paper

Threat hunting is the process of proactively searching for malware or attackers that reside on your network. The generally accepted method is to leverage a security information and event management (SIEM) solution that centrally collects log data from disparate sources — endpoints, servers, firewalls, security solutions, antivirus (AV), and more — providing visibility into network, endpoint, and application activity that might indicate an attack.

In this white paper, we will discuss the minimum toolset and data requirements you need for successful threat hunting. We will take into account that, while some readers can devote most of their time to threat hunting, like most, you have limited time and resources for this activity. The good news is that threat hunting is flexible, and anyone can do it, regardless if you are spending just a few hours a week to full time.

Zum Whitepaper
Logrythm logo
Datum: 8 July 2019, 0:00 am   |   Anbieter: LogRhythm EMEA   |   Größe: 3,52 MB   |   Sprache: Englisch
Das könnte Sie ebenfalls interessieren:
Thumb original uk uws using mitre attack in threat hunting and detection white paper

Using MITRE ATT&CK™ in Threat Hunting and Detection

MITRE ATT&CK1 is an open framework and knowledge base of adversary tactics and techniques based on real-world observations. ATT&CK provides a common taxonomy of the tactical objectives of adversaries and their methods. Having a taxonomy by itself has many valuable uses, such as providing a common vocabulary for exchanging information with others in the security community. But it also serves as a real technical framework for classifying your current detection efforts and identifying gaps where you are blind to certain types of attack beh ...

Zum Download
Thumb original uk the security operations maturity model quick reference guide brochure

The Security Operations Maturity Model Quick Reference Guide

Organisations should think of security operations as a critical business process. Effective security operations are the first line of defence when it comes to preventing cyberattacks. To accomplish this, organisations need mature programs that leverage people, process and technology to rapidly detect and respond to sophisticated attacks.

Yet some organisations struggle with the overall effectiveness of their security operations. They also lack the basis for measuring the effectiveness and maturing capabilities. A mature security operation e ...

Zum Download
Capture

Forrester- The Key To Enterprise Hybrid Multicloud Strategy - The Webinar

Forrester surveyed 350 IT decision makers to understand how they are developing and implementing their IT infrastructure strategies. Find out what they had to say in our webinar, The Key to an Effective Hybrid Multicloud Strategy. ...

Zum Download
Thumb original covid 19 and shattered supply chains final for cs

COVID-19 and shattered supply chains - Reducing vulnerabilities through smarter supply chains

Companies typically create supply chains with the expectation that materials will be easily accessible. However, as COVID-19 has shown, unexpected events can shatter this basic premise, disrupting supply chain performance.

COVID-19 has driven home the need to strengthen global supply chain networks. Supply chains should be dynamic, responsive, and interconnected to an organization’s ecosystem and processes. This requires end-to-end visibility, real-time insights, and decisive actions -particularly in escalating situations.

Systems based ...

Zum Download
Thumb original ai done right ibm ai data train inference whitepaper 74027174usen

AI done right: With a strong foundation, everyone can map a successful journey—including you"

What if you discovered that a data science background isn’t necessary to understand, interpret and act on the most complicated aspects of enterprise AI? How would that knowledge impact the business processes and applications your organization relies on to remain competitive? ...

Zum Download