GUEST ESSAY: The case for engaging in ‘threat hunting’ — and how to do it effectively
Modern cyber threats often are not obvious – in fact it is common for them to lurk inside a business’ systems for a long time without anyone noticing. This is referred to as ‘dwell time’, and a recent report from the Ponemon Ins… Continue reading GUEST ESSAY: The case for engaging in ‘threat hunting’ — and how to do it effectively