© Eric C. Thompson 2020
E. C. ThompsonDesigning a HIPAA-Compliant Security Operations Centerhttps://doi.org/10.1007/978-1-4842-5608-4_7

7. Threat Hunting

Eric C. Thompson1 
(1)
Dekalb, IL, USA
 

Threat hunting is the process of taking indicators of malicious activity, developing a hypothesis of how that malicious activity might be occurring in the environment, and hunting for it. Threat hunting, like machine learning, may just seem like a new buzzword in the information security space, but it does have its place in security operations. Threat hunting is proactively looking for indicators of compromise present in artifacts. Many times, new indicators are uncovered during investigations or by research conducted by information security practitioners and ...

Get Designing a HIPAA-Compliant Security Operations Center: A Guide to Detecting and Responding to Healthcare Breaches and Events now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.