x

Please Sign-In to Access this Report

To access other reports on the platform please sign in with your username and password, or register for a free account to get unlimited access and insight customized for you.

  • Home
  • IT
  • Security
  • Threat Hunting 101: 8 threat hunts you can do with available resources
Report LogRhythm Threat Hunting 101: 8 threat hunts you can do with available resources

Threat Hunting 101: 8 threat hunts you can do with available resources

You don't just 'go threat hunting.' You need to have a target in mind, you need to look in the right places, and you need the right weapons...

A hunter wishing to bring food home for his or her family first needs to decide what type of animal he or she is going to target. Every quarry requires its own unique methods that dictate when the hunter goes out, where he or she goes, what kind of weapon to carry, and a host of other considerations. In the world of cybersecurity, it’s no different.

Report Snap Shot

This whitepaper discusses the minimum toolset and data requirements you need for successful threat hunting. Highlights include:

  • Leveraging the right log data for threat hunting
  • 8 threats, and how to hunt them
  • The impact on the bottom line

Solution Categories

Vulnerability Scanner Software

Vulnerability Scanner Software

A vulnerability scanner software is a tool used in the field of cybersecurity to identify weaknesses...