Using a Threat-based Approach for Detections: Understanding Bad Actors

An effective strategy to detect threats in your environment

Using a Threat-based Approach for Detections: Understanding Bad Actors

01/15/2025

As a defender, a key to being successful is coming up with an effective strategy to detect […]

By |2025-01-27T17:15:50+00:00January 15, 2025|Categories: Threat Hunting|

From Theory to Practice: Testing Your Threat Hunting Hypotheses

Using threat hunting hypotheses to prevent security incidents From Theory to Practice: Testing Your Threat Hunting Hypotheses

12/19/2024

A threat hunting hypothesis refers to the proactive approach of seeking out potential threats within an organization’s network […]

By |2024-12-20T19:37:00+00:00December 19, 2024|Categories: Threat Hunting|

A Deep Dive into Black-Box, White-Box and Grey-Box Penetration Testing

How each type of penetration testing works

A Deep Dive into Black-Box, White-Box and Grey-Box Penetration Testing

12/13/2024

Taking the […]

By |2025-03-26T17:25:47+00:00December 13, 2024|Categories: Threat Hunting|

Adapting Penetration Testing Methods for Cloud Environments

Understand the specific threats in cloud environments

Adapting Penetration Testing Methods for Cloud Environments

11/20/2024

Penetration testing and security assessments face unique challenges in cloud environments. The traditional network perimeter has largely disappeared, with resources distributed […]

By |2024-11-12T22:07:48+00:00November 20, 2024|Categories: Threat Hunting|

Unlocking the Power of SIEM in Threat Hunting

Quicker, more effective threat detection and response with SIEM

Unlocking the Power of SIEM in Threat Hunting

11/06/2024

Analyzing security threats is a constant, ever-evolving job. Information from events and logging come in many different forms, […]

By |2024-11-06T18:13:29+00:00November 6, 2024|Categories: Threat Hunting|

Distinguishing Between Normal Network Behavior and Potential Cyber Threats

Tools to help spot a network threat 

Distinguishing Between Normal Network Behavior and Potential […]

By |2025-03-26T17:25:11+00:00October 23, 2024|Categories: Threat Hunting|

Four Intrusion Detection Methods for Countering Cyber Threats

An introduction into the four main detection methods

Four Intrusion Detection Methods for Countering Cyber Threats

09/17/2024

Intrusion detection methods are used to identify intruders that are trying to or have breached your network. There are […]

By |2024-09-25T16:40:03+00:00September 17, 2024|Categories: Threat Hunting|

The Power of Automated Threat Hunting

Leveraging tech to streamline processes, analyze data at scale, and respond rapidly to potential threats

The Power of Automated Threat Hunting

04/07/2024

Staying ahead of malicious actors is a continuous challenge for governments and organizations worldwide. […]

By |2024-06-11T02:51:53+00:00April 7, 2024|Categories: Threat Hunting|
Go to Top