Six Steps to Successful and Efficient Threat Hunting
Threat hunting allows security admins to identify adversaries before they have triggered an alert, making it ideal for stopping Zero-Day attacks. This technology can be used to answer questions like:
Why do I see ftp traffic to a country that we don’t do business with?
Why do I see an abnormal volume of DNS traffic from a single machine?