One Step Ahead: Using Threat Hunting to Anticipate the Unknown

Threat-hunting is a way to stay one step ahead of cybercriminals, spotting unusual activity before damage occurs

A cyberthreat could be lurking in any corner of an organization’s infrastructure. The complex networks encompassing numerous smart and interconnected technologies make it easy for cybercriminals to hide, but much more difficult for them to be found.

Yet, waiting for a cyberthreat to make an appearance is far too dangerous—if left undetected, a cybercriminal could stay in an organization’s network for years, and just think of the damage that could be caused. To combat this, threat hunting is now an essential component of any cybersecurity strategy. Rather than waiting for a hacker to make themselves known, threat hunting involves constantly and proactively searching for the threats hiding within a system, working on the assumption that a cyber hacker is ever-present and looking for signs of unusual activity before it even occurs.

But how does threat hunting work in practice, and how can the approach ensure an organization’s data is kept safe? Here’s why a proactive approach to cybersecurity is essential at a time when the threat has never been more severe.

The Need for Observability

Today’s networks are complex, presenting numerous places for a cyber hacker to hide. And unfortunately, it’s not uncommon for infiltrations to go undetected in networks for days, weeks or months. In fact, a recent report shows that it takes organizations an average of 280 days to identify and contain a data breach, but organizations can’t afford to wait this long. In this time, a cyber hacker can be traveling through the network, infiltrating systems and stealing information, making an organization’s data increasingly vulnerable.

And the length of time can even be longer than this. In the 2018 Marriott International data breach, hackers were accessing the network for over four years before they were discovered, which resulted in the records of 339 million guests being exposed. The hotel chain then suffered a second data breach this year after cybercriminals had been in the network for over one month, impacting approximately 5.2 million guests.

So, what needs to change? It is now more important than ever for organizations to be able to analyze contextual data to make informed decisions regarding their network security policy. This is not possible without 24/7/365 managed detection and response (MDR) tools for proactive threat hunting that uses event monitoring logs, automated use case data, contextual analysis, incident alerting and response, as well as applying tactics, techniques and procedures (TTPs) to identify issues that improve an organization’s security posture.

Threat Hunting: Anticipating the Unknown

When anticipating the unknown, cybersecurity analytics tools can capture data and detect evasive and malicious activity, wherever they are in the network, in real-time. Generating fine-grained policies and enforcing these is one step security teams can take to proactively detect and remediate malicious activity immediately. With policy enforcement, attackers will have a hard time attempting to make lateral east-west movements or remaining hidden in any part of the network, as the security team will be able to see inside the network and protect against threats across all attack surfaces across all manged endpoints with a unified multi-layer approach. This includes policy generation and enforcement MDR tools that can provide greater insight into the overall reliability, impact and success of network systems, their workload and their behavior to identify threats and proactively respond and protect assets.

In reality, this means that security teams can take measurable steps toward controlling system access of the network environment; knowing who is in the network, who should be able to access what data and which applications; and being the first to detect indicators of compromise (IOC).

Ahead of the Game

Threat-hunting is a way to stay one step ahead of cybercriminals. Organizations no longer have to wait to be alerted of a data breach before taking action; today, it is essential to have a complete picture of the entire network in real-time—including extending these capabilities to teleworkers—so that unusual activity can be identified and halted immediately before any damage occurs. With strong MDR tools at the core, organizations can ensure a strong and effective security posture based on anticipating the unknown, clear visibility into vulnerabilities that pose the biggest threat and identifying barriers that prevent successful tracking and remediation.

Avatar photo

Paul German

Paul is an experienced sales focused CEO with over 20 years of experience in selling, marketing, implementing and supporting networking and security technologies. Paul joined Certes in January 2015 where he initially led the EMEA region growing revenues 50% and establishing key relationships selling into multiple vertical markets, on which further success will be scaled. Before joining Certes, Paul most recently founded and grew a VoIP Security company which successfully established itself as the first Freemium VoIP Security vendor in the market obtaining over 500 product downloads in its first 12 months. Prior to this, Paul ran the EMEA region for Sipera (acquired by Avaya in 2011) successfully growing the business in the region from zero revenue in 2008 to being the top performing region for the company on acquisition. Prior to Sipera, in 2005 Paul started, grew, and sold a technology consultancy business delivering services into Fortune 100 companies, specialising in designing and delivering Voice over IP and security technologies.

paul-german has 2 posts and counting.See all posts by paul-german