Threat Hunter Archives - Exabeam

Threat Hunter

Cybercrimes are continually evolving. Make the Exabeam website and blog a regular source for your information security knowledge.

Stay ahead with Exabeam’s news, insights, innovations, and best practices covering information security and cyber threat detection and response for the security professional.

Or get our RSS feed

Threat Hunting: Methodologies, Tools and Tips for Success

What is threat hunting? Cyber threat hunting is an active information security strategy used by security analysts. It consists of searching iteratively through networks to detect indicators of compromise (IoCs), hacker tactics, techniques, and procedures (TTPs), and threats such as Advanced Persistent Threats (APTs) evading your existing security system. Threat hunting activities include: Hunting for… Read more »


Threat Hunter Articles

Demystifying the SOC, Part 5: The New SOC Maturity Model based on Outcomes

Read More

Threat Hunting: Methodologies, Tools and Tips for Success

Read More

Demystifying the SOC, Part 4: The Old SOC Maturity Model based on Speeds and Feeds

Read More

Demystifying the SOC, Part 3: Whether You Know It or Not, You Have a SOC

Read More

Demystifying the SOC, Part 2: Prevention isn’t Enough, Assume Compromise

Read More


Get the Latest on Information Security

We cover the latest in cyber security, data science, artificial intelligence, machine learning, User and Entity Behavior Analytics (UEBA), and next-gen SIEM. Make the Exabeam website and blog a regular source for your information security knowledge.

Or get our RSS feed