The Gamer Theory of Threat Hunting
Threat Hunting is Not Simply a Compromise Assessment or Continuous Security Monitoring
Get an Alertwhen The Register has something new about ...
Check the boxes & select Email or Atom/RSS Feed.
A Unique Approach for Effective Defense, “Hackers can complete an entire data breach in under 15 hours, which includes exfiltrating data,” according to a recent industry report.
In a multi-layered stack of security tools, it becomes a game of peeling or stripping back layers to find the core infection layer. When looking for the unknown infection or attack vector in your enterprise ecosystem, many organizations are shifting to iterative hunting exercises based around intelligence operations. There are three key concepts hunt gamers in an organization should focus on:
• Assuming the compromise of assets
• Examining stealthy compromise and breaches in all phases of an attack
• Thinking and reacting like an adversary
Get the paper and gamify your threat hunting!
You will have to register, or log in, in order to download this paper.