Daffodil International University

Faculty of Science and Information Technology => Recent Technologies and Trends in Software Engineering => Software Engineering => Cyber and Software Security => Topic started by: maruf.swe on March 28, 2019, 05:47:54 PM

Title: 6 Signs of Successful Threat Hunting
Post by: maruf.swe on March 28, 2019, 05:47:54 PM
(https://media.threatpost.com/wp-content/uploads/sites/103/2019/01/23104709/Cyber-Threat-Hunting.jpg)
Here are six tips to put threat hunters in the driver’s seat so they can outsmart their adversaries.

When a threat hunting program is established by an organization, their goal is to proactively hunt threats, with a focus on newer, more sophisticated attacks for which reliable signatures or indicators are not yet available. However, without an effective threat hunting program, the attacker is better positioned for success. How can they be stopped? The six tips in this post aim to put threat hunters in the driver’s seat and outsmart their adversaries.

For More Details :https://threatpost.com/6-signs-of-successful-threat-hunting/141102/ (https://threatpost.com/6-signs-of-successful-threat-hunting/141102/)