SecurityBrief Asia logo
Asia's leading source of cybersecurity and cyber-attack news

Threat hunting news stories

Story image
SonicWall
Video: 10 Minute IT Jams - SonicWall product management director discusses capture client
Today we are talking to SonicWall director of product management Suroop Chandran, for the second IT Jam of our SonicWall series.
Story image
Malware
Research finds malware will sit for around 83 hours in an employees inbox before being noticed
Research finds that malicious emails spend an average of 83 hours in employees inboxes before being noticed.
Story image
Gartner
Gartner names ThreatQuotient a representative vendor for SOAR
The company is listed in Gartner’s 2020 Market Guide for Security Orchestration, Automation and Response Solutions.
Story image
study
Companies not utilising threat hunters correctly – study
“Responding to threats is important for security, but it is not the main task of the threat hunter.”
Story image
Endpoint Protection
Symantec updates endpoint security offering
The Symantec Endpoint Security (SES) brings automated assistance with security management to evaluate risks and take action to secure their organisation.
Story image
Endpoint Protection
Sophos launches managed threat response service
The resellable service provides organisations with a dedicated 24/7 security team to neutralise threats.
Story image
Cybersecurity
Successful threat hunting requires curation & collaboration
Many organizations already have the technology required for threat hunting, with SIEMs and threat intelligence a starting point.
Story image
Cloud Security
Carbon Black announces enhanced cloud security offering
The Cb ThreatHunter announcement was made from the company’s annual user conference #CbConnect18 in New York.
Story image
Endpoint Protection
Blurred lines: How counterinsurgent strategies apply to threat hunting
Successful counterinsurgency operations depend on thoroughly understanding the environments in which they are being conducted.
Story image
Machine Learning
Make the pre-emptive strike against cyberattacks with threat hunting
Threat hunting starts with the assumption that bad actors have already breached perimeter defences and are operating inside the environment.