The cybersecurity community is in search of the “Holy Grail” of predictive mitigation to help prevent attacks.
Tools are quickly evolving and the sources that fuel the analytics for mitigation are increasing. This is the forefront of a practice called threat hunting.
Threat hunting involves active threat analysis, in which enterprises get to know their adversary and pro-actively search for their presence within a network.
Tools are quickly evolving and the sources that fuel the analytics for mitigation are increasing."
Informally, threat hunting has been around for a while. However, two things recently catapulted it into the public view.
First, there has been a mindset shift among businesses. No longer do organizations think "this could never happen to my business".
Instead, they acknowledge the importance of cybersecurity and aim to stay ahead of attackers.
Second, threat hunting has become more relevant by utilizing threat intelligence gathered through big data analytics. This helps IT teams determine who the potential bad actor is and where they’re coming from.
When setting up a threat hunting program, it's important to think about who might be attacking your platform – and why.
Think about what might motivate them and what information they may want from your network. For example, are they:
If feasible, reach out to your business community to find out if they’re experiencing similar attacks. Next, think about where a hacker might go to exfiltrate your data, and what essential business processes you need to protect.
It’s critical you baseline your business’ basic traffic patterns so you can find the anomaly before the attack is launched.
...it's important to think about who might be attacking your platform – and why."
Lastly, once you find the anomaly, have your IT team structured flexibly so team members can be re-tasked to address the issue immediately.
Work to constantly mature your threat hunting program to make it new. Because attacks are constantly evolving, you want to see to it that you are keeping up with new trends in the cybersecurity space.
Consider purchasing software to aid in your threat hunting endeavor. The software should:
To learn more about threat hunting, check out AT&T Threat Manager – Log Analysis.
Share this with others
READ MORE ARTICLES ON:
Sign up for the AT&T Business newsletter
Your feedback will help us to improve AT&T Business so you continue to have a great experience when visiting us!
This survey is conducted by an independent company ForeSee for AT&T.
Yes, I’ll give feedback!
Please provide the following information to access your document:
* To access your content, please check your browser settings to make sure pop-up windows are allowed.