Where Does your Agency Stand on the Cyber Threat Hunting Maturity Model?

Many organizations are quickly discovering that cyber threat hunting is the next step in the evolution of the modern Security Operations Center (SOC).

But what is “hunting"?

Sqrrl, a leader in big data analytics and cybersecurity, defines hunting as “the process of proactively and iteratively searching through networks to detect and isolate advanced threats that evade existing security solutions.”

No More F.U.D. (Fear, Uncertainty, Doubt) about Cyber Threats

I’m fed up. Better yet, I’m “F.U.D.-ed” up.  In every cybersecurity conference, in every threat report, in every blog and every bit of cybersecurity marketing literature I see one tiresome theme:  “The bad guys are after us!  It’s getting worse every day!  How will we fix it?  Can we fix it?  There’s no magic bullet! The cyber sky is falling, run for your cyber life!”  In other words, an unrelenting stream of– Fear, Uncertainty, and Doubt.

New: Your Guide to Government's Critical Cyberthreats!

Data leaks, data breaches, blah, blah, blah. Sometimes the attention-grabbing headlines just sound like too much noise.

What’s lacking in most of today’s reporting is the real truth about how government agencies are hacked and what agencies are doing to counter those attacks. Those are the details that can help agencies improve their defenses to face future challenges.