Threat Hunting is critical for any digitally connected organization to promote proper security hygiene, reduce compromise dwell time and exposure, discover gaps, and reduce the exposed attack surface. Today’s sophisticated and targeted threats require active hunting rather than passive detection to keep an organization safe and secure via investigation and anomaly detection tailored toward organization-specific services and implementations.
Because of the relative newness of the field and the demand for cybersecurity talent, there’s an assumption that only the most sophisticated organizations are able to leverage threat hunting activities. However, in reality, organizations do not have to be highly resourced or sophisticated to effectively leverage threat hunting to protect themselves from cyber risks.
The massive SolarWinds breach that took place earlier this year should set clear precedence that the supply chain and third-party risks are only increasing and should be taken very seriously. These breaches demonstrate that “check-list security” is no longer enough to ensure protection, and that, now more than ever, understanding one’s supply chain network dependencies is critical within a cybersecurity program.