A Practical Model for Conducting Cyber Threat Hunting

There remains a lack of definition and a formal model from which to base threat hunting operations and quantifying the success of said operations from the beginning of a threat hunt engagement to the end that also allows analysis of analytic rigor and completeness. The formal practice of threat...
By
Dan Gunter
November 29, 2018

All papers are copyrighted. No re-posting of papers is permitted

470x382_Generic_Whitepaper.jpg