{"id":18911,"date":"2022-05-02T03:20:52","date_gmt":"2022-05-02T11:20:52","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2022\/05\/02\/news-12644\/"},"modified":"2022-05-02T03:20:52","modified_gmt":"2022-05-02T11:20:52","slug":"news-12644","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2022\/05\/02\/news-12644\/","title":{"rendered":"Getting started with threat hunting: five steps to support successful outcomes"},"content":{"rendered":"<p><strong>Credit to Author: Doug Aamoth| Date: Mon, 02 May 2022 09:00:45 +0000<\/strong><\/p>\n<div class=\"entry-content lg:prose-lg mx-auto prose max-w-4xl\">\n<figure id=\"attachment_84343\" aria-describedby=\"caption-attachment-84343\" style=\"width: 199px\" class=\"wp-caption alignright\"><a href=\"https:\/\/www.sophos.com\/en-us\/whitepaper\/getting-started-with-threat-hunting\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" loading=\"lazy\" class=\"border-image wp-image-84343 size-medium\" style=\"border: 1px solid silver;\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/04\/Cover.png?w=199\" alt=\"\" width=\"199\" height=\"300\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/04\/Cover.png 531w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/04\/Cover.png?resize=199,300 199w\" sizes=\"auto, (max-width: 199px) 100vw, 199px\" \/><\/a><figcaption id=\"caption-attachment-84343\" class=\"wp-caption-text\"><a href=\"https:\/\/www.sophos.com\/en-us\/whitepaper\/getting-started-with-threat-hunting\">Click here to read the report<\/a><\/figcaption><\/figure>\n<p>Over the last year, 59% of organizations experienced an increase in the complexity of cyberattacks<sup>1<\/sup>.\u00a0Malicious actors are more cunning than ever, increasingly deploying stealthy human-led techniques to conduct their attacks.<\/p>\n<p>As a result, security teams have turned to the practice of threat hunting in order stop these advanced threats \u2013 but it isn\u2019t easy.<\/p>\n<p>In our new guide, <a href=\"https:\/\/www.sophos.com\/en-us\/whitepaper\/getting-started-with-threat-hunting\">Getting Started With Threat Hunting<\/a>, we cover what threat hunting is, why it has become an essential part of your security efforts, and how to go about it. \u00a0We also provide an in-depth overview of the tools and frameworks security teams are leveraging to help them stay ahead of the latest threats and rapidly respond to any potential attacks.<\/p>\n<h2>Five steps to help you prepare for threat hunting<\/h2>\n<p>As far as security operations go, preparation is key to success. It\u2019s important to lay the right foundations before you begin to hunt in earnest. We recommend the following five steps to set your organization and team up for success:<\/p>\n<ol>\n<li>Understand the maturity of your current cybersecurity operations<br \/> Mapping your processes to a cybersecurity maturity model (such as the CMMC) is a great way to establish how well equipped (or not) you are to begin threat hunting. It&#8217;s also a good idea to audit your security posture to determine just how susceptible to threats you might be.<\/li>\n<li>Decide how you want to go about threat hunting<br \/> Once you\u2019ve established your cyber maturity, you can then decide whether threat hunting is something you want to do in-house, fully outsource, or a combination of the two.<\/li>\n<li>Identify technology gaps<br \/> Review your existing tools and identify what else you need to do effective threat hunting. How effective is your prevention technology? Does it have or support threat hunting capabilities?<\/li>\n<li>Identify skills gaps<br \/> Threat hunting requires specialist skills. If you don&#8217;t have the experience in-house, explore training courses to help develop the necessary skills. Also, consider working with a third-party provider to supplement your team.<\/li>\n<li>Develop and implement an incident response plan<br \/> It is essential to have a fully-fledged incident response plan in place to ensure any response is measured and controlled.\u00a0 Having a well-prepared, well-understood response plan that all key parties can immediately put into action will dramatically reduce the impact of an attack on your organization.<\/li>\n<\/ol>\n<p>For more details, read <a href=\"https:\/\/www.sophos.com\/en-us\/whitepaper\/getting-started-with-threat-hunting\">Getting Started With Threat Hunting<\/a>.<\/p>\n<h2>Threat hunting enablers<\/h2>\n<p>Effective threat hunting requires a combination of next-generation technologies with extensive human expertise.<\/p>\n<h3>Prevention technologies \u2013 reducing signal fatigue<\/h3>\n<p>Threat hunters can only conduct their roles efficiently if they aren\u2019t inundated with security alerts. One way to achieve this is to introduce best-in-class prevention technologies so that defenders can focus on fewer, more accurate detections and streamline the subsequent investigation and response process.<\/p>\n<p>The prevention capabilities in Sophos Intercept X Endpoint protection block 99.98% of threats<sup>2<\/sup> enabling defenders to better focus on the suspicious signals that require human intervention.<\/p>\n<p>You can learn more about or take a trial of <a href=\"https:\/\/www.sophos.com\/en-us\/products\/endpoint-antivirus\/\">Intercept X Endpoint here.<\/a><\/p>\n<h3>Threat hunting technologies &#8211; endpoint\/extended detection and response (EDR\/XDR)<\/h3>\n<p>For threat hunters to identify and investigate potentially malicious activities, they need inputs and investigation tools. Enter EDR and XDR. They enable hunters to quickly see suspicious detections and investigate them thoroughly.<\/p>\n<p>EDR provides inputs from the endpoint solution. In contrast, XDR consolidates signals from across the wider IT environment, including firewall, mobile, email, and cloud security solutions. Given that adversaries exploit every attack opportunity, the wider you cast your signal net, the better you can detect them early.<\/p>\n<p>Designed for security analysts and IT administrators alike, <a href=\"https:\/\/www.sophos.com\/en-us\/products\/endpoint-antivirus\/xdr\">Sophos XDR<\/a> enables your team to detect, investigate, and respond to incidents across your IT estate. Instantly get to the information that matters to you by choosing from a library of pre-written, customizable templates covering many different threat hunting and IT operations scenarios \u2013 or write your own.<\/p>\n<p>To test out Sophos XDR\u2019s threat hunting capabilities, you can either start an in-product trial (if you have a Sophos Central account) or <a href=\"https:\/\/www.sophos.com\/en-us\/products\/endpoint-antivirus\/free-trial\">take a trial of Sophos Intercept X Endpoint<\/a>, which includes XDR.<\/p>\n<h3>Threat hunting services \u2013 managed detection and response (MDR)<\/h3>\n<p>MDR, delivered as a fully managed service, empowers organizations with a dedicated team of security analysts hunting for lurking threats 24\/7\/365. In fact, <em>\u201c51% utilize a managed detection and response (MDR) service provider to help integrate telemetry data for threat detection and response,\u201d<\/em> according to ESG Research.<\/p>\n<p>MDR providers, like <a href=\"https:\/\/www.sophos.com\/en-us\/products\/managed-threat-response\/rapid-response\">Sophos Managed Threat Response (MTR)<\/a>, have a variety of advantages over an in-house only security operations program. The most significant advantage of them all is often experience.<\/p>\n<p>The Sophos MTR team has thousands of hours of experience, having seen and dealt with everything adversaries can throw at them. They can also learn from attacks on one organization and apply them to all customers. Another benefit is scale: the Sophos MTR team can provide 24\/7 support delivered by three global teams.<\/p>\n<p>To discuss how Sophos MTR can support your organization, speak to your Sophos representative or <a href=\"https:\/\/secure2.sophos.com\/en-us\/products\/managed-threat-response\/contact-request.aspx\">request a callback<\/a>. In the meantime, catch up on the <a href=\"https:\/\/news.sophos.com\/en-us\/category\/security-operations\/\">latest MTR research and casebooks<\/a>.<\/p>\n<p><em><sup>1<\/sup>The State of Ransomware 2022 &#8211; Sophos<\/em><\/p>\n<p><em><sup>2<\/sup>AV-Test average score: Jan-Nov 2021<\/em><\/p>\n<\/p><\/div>\n<p><a href=\"https:\/\/news.sophos.com\/en-us\/2022\/05\/02\/getting-started-with-threat-hunting-5-steps-to-support-successful-outcomes\/\" target=\"bwo\" >http:\/\/feeds.feedburner.com\/sophos\/dgdY<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/04\/hunting.png\"\/><\/p>\n<p><strong>Credit to Author: Doug Aamoth| Date: Mon, 02 May 2022 09:00:45 +0000<\/strong><\/p>\n<p>Get practical guidance on how to prepare to search for and neutralize elusive cyber threats<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10377],"tags":[23925,24562,12750,22487],"class_list":["post-18911","post","type-post","status-publish","format-standard","hentry","category-security","category-sophos","tag-mtr","tag-products-services","tag-threat-hunting","tag-xdr"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18911","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=18911"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18911\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=18911"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=18911"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=18911"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}