The Threat Hunting Shift. Part 4: Adversarial Framework for Tactical Cyber Defense Operations II
Continuing from Threat Hunting Shift Part 3, we will now introduce the Defend and Design domains. So without further ado,
The Threat Hunting Shift. Part 2: The Way of the Intercepting Fist II
We discuss Active Defense, moving beyond a passive approach to detection. How can we intentionally shape threat actor behavior via Controlled Attack Paths and Cyber Deception? Defenders inadvertently influence attackers by the way they configure layered defenses, impacting attack preferences.
The Threat Hunting Shift. Part 1: The Way of the Intercepting Fist I
While Threat Hunting is commonly seen as proactive threat detection, we propose a broader approach through the lens of Active Defense. This involves intercepting and disrupting adversaries with the goal of actively shaping attacker behavior rather than relying solely on detection.