The proactive process of searching for cyber threats that have evaded existing security controls. Threat hunters use hypotheses, analytics, and threat intelligence to identify hidden threats within an organization's environment.
Related Terms
Indicators of Compromise (IOC)
incident-responseObservable artifacts or evidence that indicate a system has been compromised or is under attack. IOCs include unusual ne...
Security Information and Event Management (SIEM)
incident-responseA solution that aggregates and analyzes security log data from across an organization's IT infrastructure to detect thre...
Security Operations Center (SOC)
incident-responseA centralized unit that monitors, detects, investigates, and responds to cybersecurity incidents around the clock. SOC t...