by Eric Cole | Aug 30, 2017 | Threat Hunting
This is the second installment in a three-part series on threat hunting by Dr. Eric Cole published on the IBM SecurityIntelligence blog. Be sure to read Part 1 and Part 3 for more information. A threat hunting program can provide an accurate picture of where your...
by Eric Cole | Aug 23, 2017 | Threat Hunting
This is the first installment in a three-part series on threat hunting by Dr. Eric Cole published on the IBM SecurityIntelligence blog. Be sure to read Part 2 and Part 3 for more information. One of the fundamental problems with cybersecurity is that organizations...