Quantcast
Channel: Threat Hunting – DLT Blog
Browsing latest articles
Browse All 9 View Live

Where Does your Agency Stand on the Cyber Threat Hunting Maturity Model?

Many organizations are quickly discovering that cyber threat hunting is the next step in the evolution of the modern Security Operations Center (SOC). But what is “hunting”? Sqrrl, a leader in big data...

View Article



Close the Gap between Threat Detection and Response with User and Entity...

Could user and entity behavior analytics (UEBA) be the missing piece of the puzzle that security teams have been waiting for in their bid to outmaneuver threat actors? As the average amount of time...

View Article

Using Threat Hunting to Protect “Swiss Cheese” Security Infrastructures

As another high profile government leak hits the headlines in the wake of the Democratic National Convention (DNC), the focus on developing a more proactive security posture through threat hunting, not...

View Article

Supercharge Your SIEM with Threat Hunting

Security Information Event Management (SIEM) tools have been around for quite some time. SIEMs are great for aggregating log files, parsing them, and using real-time correlation rules to spot security...

View Article

Threat Hunting – Finding and Thwarting Mr. Robot

The concepts of threat hunting and threat intelligence went mainstream in 2016 bringing with it a whole new paradigm to threat mitigation and cybersecurity. But what is threat hunting and what use...

View Article


The State of Threat Hunting in the 2017 SOC

While much of the focus on cybersecurity risks has been focused on prevention and detection, many organizations are quickly discovering that threat hunting is the next step in the evolution of their...

View Article

The Need for Advanced Threat Hunting

The 2017 DefCon conference featured former World Chess Champion Garry Kasparov, who spoke about artificial intelligence, computers, and of course, chess.  After losing a match to a purpose-built...

View Article

Threat Hunting and Your SIEM: 10 Reasons Why You Need Both

I bet there was a time you loved your security information and event management (SIEM) system. This central location for managing all the security events on your network. But, as good as it may seem,...

View Article


Is Your Agency Ready for the Threat Hunt?

Targeted campaigns by malicious actors have become commonplace. As recent breaches show, these threat actors can stay hidden on agency networks for long periods of time, assessing your systems and...

View Article

Browsing latest articles
Browse All 9 View Live




Latest Images