property | value |
tags | book,pkm-pocket-pipeline,threat-hunting |
url | |
original_word_count | 2172 |
Article Excerpt
Get full access to Threat Hunting and 60K+ other titles, with a free 10-day trial of O'Reilly. There are also live events, courses curated by job role, and more.
Long Summary
Threat hunting is an advanced security analysis process that leverages deep knowledge of a network or organization to catch subtler, more deeply embedded attackers than a Security Operations Center (SOC) finds. It is a proactive approach to cybersecurity that involves actively searching for malicious activity on a network. The threat hunting process is divided into three parts: trigger, hunt, and export. The trigger refers to the process by which a hunt begins, usually driven by analyst intuition about something behaving odd on the network. The hunt is an iterative process by which analysts identify something odd about a network, test out hypotheses, and eventually come to a conclusion. The export is the conclusion of the hunt, which results in the hunter coming to a conclusion and communicating that result to the main operations team.
Cliff Stoll, an astronomer-turned-cybersecurity expert, wrote a book in 1989 that predates the fall of the Berlin Wall. In it, he discussed the importance of threat hunting and the need to be proactive in order to protect networks from malicious actors. He argued that it is important to think of the potential threats that could be lurking in the shadows, rather than just relying on the traditional methods of security.
Threat hunting is similar to scientific research, rapid prototyping, or intelligence analysis, but has distinguishing characteristics such as limited data, limited time, fewer universals, and easier prototyping. It is a formally young field, and people have started to compare notes and identify what works. It is important to read outside of the field and look at how engineering and scientific processes work, how intelligence analysis and detectives operate, and work on rapid prototyping to inform hunts.
O'Reilly has created a learning platform to help people learn more about threat hunting. It includes books, live events, courses, and more from O'Reilly and nearly 200 top publishers. This platform is designed to help people understand the importance of threat hunting and how to use it to protect their networks.
Threat hunting is an important process that provides an enterprise-wide benefit and saves time and money for the whole enterprise. It is a proactive approach to cybersecurity that involves actively searching for signs of malicious activity and being aware of the potential threats that could be lurking in the shadows. O'Reilly's learning platform provides resources to help people understand the importance of threat hunting and how to use it to protect their networks. By understanding the importance of threat hunting and how to use it, organizations can protect their networks from malicious actors and save time and money
Short Summary
š Threat Hunting
šš½ Get full access to Threat Hunting and 60K+ other titles, with a free 10-day trial of O'Reilly. There are also live events, courses curated by job role, and more. šš½ Threat hunting catches more deeply embedded attackers than a Security Operations Center (SOC) can. šš½ It is a proactive approach to cybersecurity, actively searching for malicious activity. šš½ The threat hunting process consists of trigger, hunt, and export stages. šš½ Trigger stage begins with analyst intuition about odd behavior on the network. šš½ The hunt is an iterative process of identifying oddities, testing hypotheses, and concluding. šš½ The export stage communicates the conclusion to the main operations team. šš½ Cliff Stoll emphasized the importance of proactive threat hunting in his book. šš½ Threat hunting is comparable to scientific research, rapid prototyping, and intelligence analysis. šš½ O'Reilly's learning platform offers resources to understand threat hunting and protect networks. šš½ Threat hunting provides enterprise-wide benefits, saving time and money for organizations.
š summarized content: https://hut.threathunterz.com/battlefield-intel/articles-and-reports/threat-hunting
#ThreatHunting #ProactiveCybersecurity #NetworkProtection #OReillyLearning #TimeAndMoneySaving