Threat Hunting in Action: SANS 2018 Survey Results, Part II – SANS Institute

CERT-LatestNews ThreatsCybercrime ThreatsStrategic VulnerabilitiesAll VulnerabilitiesCrypto VulnerabilitiesFirmware VulnerabilitiesHardware

Overview. Cyber threat hunting, once the job of only highly trained specialists, is maturing and growing more operationalized. While cyber threat hunting will always require the knowledge, critical thinking and skills of seasoned professionals, hunting capabilities are becoming more automated and integrated into overall SOC functions.