This post was originally published by (ISC)² Management.
It could be a blended attack as slick as a multichannel marketing campaign. Or a spontaneous crime of opportunity by a single dis-gruntled employee. It could even be an innocent configuration error. When a threat exists, there will be indicators. The perennial challenge is to hunt for signs in the right places and to isolate the signal from the noise. How best to find—and remove, where possible—such threats remains up for debate.
Read more here: https://blog.isc2.org/isc2_blog/2020/02/threat-hunting-is-your-security-operation-ready-to-launch-such-a-program.html