Threat Hunting Basics: What You Need To Know

Done right, threat hunting can produce substantial cybersecurity benefits to an organization. This report breaks down the threat hunting basics, including what IT pros need to know about the tools, techniques and people involved in successful threat hunting efforts.

Karen D. Schwartz, Contributor

June 9, 2021

1 Min Read
threat hunting basics
Getty Images

Cyberthreats are going nowhere but up – and cybercriminals are only becoming more sophisticated, often to the point where their exploits can’t be detected by traditional security tools.

Organizations are doing what they can to keep up with the volume and changing nature of threats by implementing more cybersecurity technology and spending more on cybersecurity protection, but they are fighting an uphill battle. The most proactive companies are upping their game, including utilizing some form of threat hunting – which combines tools and people to monitor network endpoint data to find unusual activity or evidence of ongoing attacks – to help even the score. The most recent report from Cybersecurity Insiders found that 65% of organizations that don’t already have a threat hunting program plan to build one over the next three years.

This report on threat hunting basics examines the benefits of this approach, as well as the groundwork, tools, techniques and people needed for threat hunting efforts to be successful. It also looks at the characteristics of a good threat hunter and details the threat hunting maturity model for getting a threat hunting program up and running effectively.

 

Read more about:

Downloads

About the Author

Karen D. Schwartz

Contributor

Karen D. Schwartz is a technology and business writer with more than 20 years of experience. She has written on a broad range of technology topics for publications including CIO, InformationWeek, GCN, FCW, FedTech, BizTech, eWeek and Government Executive

https://www.linkedin.com/in/karen-d-schwartz-64628a4/

Sign up for the ITPro Today newsletter
Stay on top of the IT universe with commentary, news analysis, how-to's, and tips delivered to your inbox daily.

You May Also Like