Threat hunting 101: The tools you need to spot suspicious activity

Threat Hunting 101: 8 Threat Hunts You Can Do with Available Resources

Cover

Threat hunting is the process of proactively searching for malware or attackers that reside on your network.

But keep in mind; you don’t just “go threat hunting.” You need to have a target in mind, you need to look in the right places, and you need the right weapons.

In this white paper, explore the 8 types of threat hunts that you can use to spot suspicious abnormalities that might be a leading or active indicator of threat activity.

Vendor:
LogRhythm, Inc.
Posted:
27 Aug 2019
Published:
27 Aug 2019
Format:
PDF
Length:
25 Page(s)
Type:
White Paper
Language:
English
Already a Bitpipe member? Login here

Download this White Paper!