Breach Preparedness , Breach Response , Cybersecurity Effective Cyber Threat Hunting Requires an Actor and Incident Centric Approach Presented by IBM & Intel 417 60 Twitter Facebook LinkedIn Many companies today design their cyber security strategy around an incident centric approach – how & when did the hack occur? But this approach leaves out a critical component that can be the difference between a reactive and proactive strategy, the threat actor behind the hack.
Read full news article on bankinfosecurity.com