Threat Hunting: Real World vs. Cyber World

Metadata

  • Author: Phil Venables
  • Full Title: Threat Hunting: Real World vs. Cyber World
  • Category:articles
  • Summary: Phil Venables compares wildlife hunting techniques to cyber threat hunting in a fun and thought-provoking way. He outlines various hunting methods, like still hunting and baiting, and connects them to strategies used in cybersecurity, such as using honeypots to lure attackers. The article suggests that lessons from real-world hunting can offer valuable insights for improving cyber defense tactics.
  • URL: https://www.philvenables.com/post/threat-hunting-real-world-vs-cyber-world

Highlights

  • We often talk about attackers only having to be right once, and defenders right all the time. I think you can reverse this in many respects. We should remember that defenders often have home-field advantage. In other words they control their own environment and can build choke points in their architecture (gateways, access control points, proxies and so on) to drive attackers through those points. (View Highlight)