incident response program

The Truth Is That Threat Hunting Is More Art Than Science

Threat detection relies on signatures or the correlation of system events to identify indicators of compromise (IOCs). As such, it is primarily reactive and used to verify if a breach has occurred, and to assess the scope and spread of a threat. This article explains how proactive threat hunting can address this inherent weakness in threat detection by assuming a threat or threat actor has not been detected, yet may have targeted an organization.

A Dialogue with Roland Cloutier - SVP & CSO of ADP

Learn how a powerful sense of mission can provide motivation to solve complex problems and meaning in the InfoSec life from ADP SVP/CSO Roland Cloutier.