The Pros and Cons of Threat Hunting

The Pros and Cons of Threat Hunting Assuming Breach Stealthy supply chain attacks like Solorigate and Log4j have shined a light on the importance of assuming breach. When these attacks hit the news, vendors and analysts often suggest to “hunt for Indicators of Compromise.” IT and security pros spend nights and weekends determining the extent […]