Threat hunting – what, why and how

While many organizations utilize cybersecurity solutions like endpoint protection platforms (EPP), around 10% of cyberthreats – including new, unknown and evasive threats such as many types of ransomware – are capable of bypassing these defenses.

Threat hunting works on the assumption that although an organization’s existing security controls haven’t detected or reported anything, the organization has in fact been compromised and some kind of threat is already in the system.

Threat hunting then uses tools including endpoint detection and response (EDR) and clearly defined and structured processes to spot the telltale signs that a breach has occurred and identify it. Not only can this proactive, pre-emptive approach minimize the harm that can be inflicted by potentially extremely damaging human-driven attacks, it also helps to strengthen and validate security controls to better defend the organization in the future.

    I would like to receive information via email about future Kaspersky whit? papers, webcasts, videos, events and other marketing materials and related offers as per the Privacy Policy

    All information that you supply is protected by our Privacy Policy.
    In order to provide you with this free service, we may share your business information with companies whose content you choose to view on this website.
    By submitting your information you agree to our Terms of Use.
    Third party cookies may be placed, to serve more relevant ads when you browse the web.
    You can learn more about those ads here.