Threat Hunter Archives - Exabeam

Threat Hunter

Cybercrimes are continually evolving. Make the Exabeam website and blog a regular source for your information security knowledge.

Stay ahead with Exabeam’s news, insights, innovations, and best practices covering information security and cyber threat detection and response for the security professional.

Or get our RSS feed

Threat Hunting: Methodologies, Tools and Tips for Success

What is threat hunting? Cyber threat hunting is an active information security strategy used by security analysts. It consists of searching iteratively through networks to detect indicators of compromise (IoCs), hacker tactics, techniques, and procedures (TTPs), and threats such as Advanced Persistent Threats (APTs) evading your existing security system. Threat hunting activities include: Hunting for… Read more »


Threat Hunter Articles

SOC Processes and Best Practices in a DevSecOps World

Read More

Automated SOCs — Musings from Industry Analysts (and Ex-analysts)

Read More

Demystifying the SOC, Part 5: The New SOC Maturity Model based on Outcomes

Read More

Threat Hunting: Methodologies, Tools and Tips for Success

Read More

Demystifying the SOC, Part 4: The Old SOC Maturity Model based on Speeds and Feeds

Read More


Get the Latest on Information Security

We cover the latest in cybersecurity, data science, artificial intelligence, machine learning, User and Entity Behavior Analytics (UEBA), and next-gen SIEM. Make the Exabeam website and blog a regular source for your information security knowledge.

Or get our RSS feed