When you enlist a hunt team to run compromise assessments, it’s important to determine which solutions and processes they’re using to actively hunt down threats. After all, compromise assessments (time-bound or more focused projects) are proactive efforts to detect persistent threats that have evaded existing security controls. You must adopt the mindset that your existing controls have already… Read More
Category: Threat Hunting
Q&A Part II: Common Misconceptions About Threat Hunting and the Impact of Moving to the Cloud
Yesterday, Delta Risk’s Andrew Cook and Infocyte Founder and Chief Product Officer Chris Gerritz presented a webinar on “Threat Hunting Versus Compromise Assessments: What’s the Difference?” In advance of the webinar, Dev Panchwagh spoke with the presenters to gain more insights into this subject, including common misconceptions and the impact of moving to the cloud. Dev: I wanted to get your thoughts on the cloud…. Read More
Q&A: Common Misconceptions About Threat Hunting and Compromise Assessments
In advance of our upcoming webinar on “Threat Hunting Versus Compromise Assessments: What’s the Difference?” Dev Panchwagh spoke with the presenters, Delta Risk’s Andrew Cook and Infocyte Founder and Chief Product Officer Chris Gerritz. In Part I of this two-part blog series, the team discusses some of the common misconceptions around threat hunting and compromise assessments. Join our webinar on April… Read More