This post was originally published by (ISC)² Management.
It could be a blended attack as slick as a multichannel marketing campaign. Or a spontaneous crime of opportunity by a single dis-gruntled employee. It could even be an innocent configuration error. When a threat exists, there will be indicators. The perennial challenge is to hunt for signs in the right places and to isolate the signal from the noise. How best to find—and remove, where possible—such threats remains up for debate.
Read more here: https://blog.isc2.org/isc2_blog/2020/02/threat-hunting-is-your-security-operation-ready-to-launch-such-a-program.html
Photo:https://ift.tt/1qHGp7p
The post THREAT HUNTING: IS YOUR SECURITY OPERATION READY TO LAUNCH SUCH A PROGRAM? appeared first on Cybersecurity Insiders.
February 29, 2020 at 05:56PM
0 comments:
Post a Comment