Let's be honest.
Threat hunting is not a new technique that's been used to battle attackers. It's been there for quite sometime. However, only recently has it gained popularity in modern security operation centers (SOCs). Organizations realize that cyberattacks are unavoidable, so they have shifted their security strategies to better equip themselves. As a result, threat hunting has become imperative.
Many organizations have recognized that a proactive security approach is vital for enhancing their security posture. They are now ready to invest time, money, and resources on this mature security model.
Let's now dive deeper into the threat hunting fundamentals.
Prerequisites for setting up a threat hunting program
To start any security program, you must first know your current status. A threat hunting program is no exception. The threat hunting maturity model (THMM) can help with this.