THREAT MONITORING USE CASE APPROACH

Read the original article: THREAT MONITORING USE CASE APPROACH


Threat hunting or monitoring is the practice of actively seeking out cyber threats in an organization or network. A threat hunt can be conducted during a security incident, or pre-incident time to discover new and unknown attacks or breaches. Threat hunting requires quality use cases which can run on top of the security data across the organization, and pin point the required information to complete the threat investigation. These use case works on top of the correlation engine provided by…


Read the original article: THREAT MONITORING USE CASE APPROACH