THREAT HUNTING IN THE CLOUD
Threat hunting in the cloud – a search-and-destroy mission for attacks against assets the CISO neither owns nor manages directly – has become the latest challenge for IT departments that have limited staff resources but significant cloud exposure. Cloud-based systems, and the off-prem infrastructure that feeds these remote servers, do not lend themselves to some traditional approaches where IT staffs have physical access to the servers and networks. Threat hunting is essentially proactively and repeatedly searching through networks to identify threats that have evaded your other security precautions, so gaining visibility into these off-prem networks is essential. This eBook will look at how companies gain this visibility and what they can and cannot do from a practical standpoint to detect, isolate and remediate these threats effectively in this environment.