Tag: ttp

  • Cyber Threat Hunting

    Cyber Threat Hunting

    Through threat hunting and incident response, hackers can be thwarted from achieving their goals during an active compromise. Threat hunting leverages intelligence to proactively seek and find MCAs on a network, whereas incident response seeks to scope, contain, and eliminate an identified MCA.  Therefore, successful threat hunting triggers incident response actions.