Introducing threat hunting
As the computing age was blossoming, we started creating more data and that data became ever more valuable than the data before it. As data became more valuable, there were others who were not meant to have access to data who wanted it. This created the first information security teams – groups that identify unauthorized access to systems, chase down aggressors, and evict them from the contested network. Threat hunting was "a thing" before it had a name.
The problem with this early approach to information security/security operations was that it was very reactionary and as our data continued its climb in value, adversaries became more incentivized to pilfer this data. We, as defenders, needed to get in front of the compromises and identify the threats and capabilities of adversaries and adapt our security countermeasures to proactively defend our environment. In the event a compromise occurred, we needed to understand the extent of the...