Category: Security Operations

Security

Threat Hunting – Practical Guide

Resource: https://www.threathunting.net/files/hunt-evil-practical-guide-threat-hunting.pdf To begin, let’s clarify what threat hunting is: Threat hunting is the human-driven, proactive and iterative search through networks, endpoints, or datasets in

Read More

Threat Hunting Techniques, What is Hunting? Maturity model.

Resources: threat hunting: https://www.threathunting.net/ sqrrl archive: https://www.threathunting.net/sqrrl-archive practical hunting: https://www.threathunting.net/files/hunt-evil-practical-guide-threat-hunting.pdf huntpedia: https://www.threathunting.net/files/huntpedia.pdf framework cyber threat hunting: https://www.threathunting.net/files/framework-for-threat-hunting-whitepaper.pdf Threat Hunting is a creative process. One’s abilities

Read More

Prodigy 13 Newsletter

Sign up for our monthly newsletter for business leaders on minimizing cybersecurity risk.