Summary: Phil Venables compares wildlife hunting techniques to cyber threat hunting in a fun and thought-provoking way. He outlines various hunting methods, like still hunting and baiting, and connects them to strategies used in cybersecurity, such as using honeypots to lure attackers. The article suggests that lessons from real-world hunting can offer valuable insights for improving cyber defense tactics.
We often talk about attackers only having to be right once, and defenders right all the time. I think you can reverse this in many respects. We should remember that defenders often have home-field advantage. In other words they control their own environment and can build choke points in their architecture (gateways, access control points, proxies and so on) to drive attackers through those points. (View Highlight)