© Eric C. Thompson 2020
E. C. ThompsonDesigning a HIPAA-Compliant Security Operations Centerhttps://doi.org/10.1007/978-1-4842-5608-4_7

7. Threat Hunting

Eric C. Thompson1 
Dekalb, IL, USA

Threat hunting is the process of taking indicators of malicious activity, developing a hypothesis of how that malicious activity might be occurring in the environment, and hunting for it. Threat hunting, like machine learning, may just seem like a new buzzword in the information security space, but it does have its place in security operations. Threat hunting is proactively looking for indicators of compromise present in artifacts. Many times, new indicators are uncovered during investigations or by research conducted by information security practitioners and ...

Get Designing a HIPAA-Compliant Security Operations Center: A Guide to Detecting and Responding to Healthcare Breaches and Events now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.