Tools and Techniques for Threat Hunting and Threat Research

Tools and Techniques for Threat Hunting and Threat Research

The right tools and techniques matter. If you need to rebuild your deck, but all you have is a screwdriver and zero carpentry skill, you can struggle through mistakes and long hours—or you can call a professional with the right tools and techniques to get the job done efficiently and effectively.


The same is true in the ongoing fight against cyber adversaries. According to Keith Jarvis, Secureworks’ Senior Security Researcher and Lead for Cybercrime, and Ryan Cobb, Secureworks’ Senior Information Security Researcher and threat hunter, evolving your tools and hunting techniques are critical steps in the race against cybercrime.


At the end of the day, adversaries are humans too. And they’re also developing new tools and refining techniques. That’s why you cannot simply rely on tools and techniques you used last year, last month, or perhaps even last week.


One area security that professionals must focus on is how to scale their work. With the volume of data coming in daily, automation is no longer a luxury, but a necessity. In a recent episode of The Cybersecurity Advantage podcast, Keith explains how Secureworks has put this in practice through botnet emulation as a force multiplier, taking the manual work from individual researchers and automating it.

Key advantages of this automation, according to Keith, mean that the time in a researcher’s day can be better utilized researching threats and taking action. Plus, a closed loop system versus manual entry points shortens the time to detection.


Another technique companies are turning to in order to gather data is threat hunting. According to Ryan, companies he counsels often want to start threat hunting for the same reason: to mitigate feelings of insecurity caused by gaps in an environment.


But co ..

Support the originator by clicking the read the rest link below.