Page 50 - Dataquest
P. 50

INTEllIGENT COMPUTING | SECURITY
                                                                               Tanmoy saha
                                                                               maildqindia@cybermedia.co.in





          Cyber Analytics Driven Threat


          Hunting: The Next Step for data


          Security Management





          Threat Hunting is an analyst-centric process which requires a significant
          investment of personnel, equipment, and time




































                 he barrage of technology in the 21st century is   marily on preventive technologies, and rule & signature-
                 pushing organizations to keep up with the pace   based  detection  mechanisms  ineffective.  This  evidently
                 of innovations for delivering expanded and more   emphasizes the need for organizations to adopt smarter
         T efficient services to their customers. The disrup-  ways to tackle the ever changing threat scenario.
          tive technologies like Cloud Computing, IT Mobility, Inter-  As organizations do not have the key information to
          net of Things, Industry 4.0 etc. are reshaping the world   contextualize  and  lack  the  trained  resources  for  per-
          faster than ever before and have paved the way for digital   forming the risk analysis, the primary challenge it faces
          transformation. But embracing these technologies neces-  in threat detection and risk mitigation, is gaining visibil-
          sitates the enterprise to connect with external stakehold-  ity into their environment. In the wake of this stumbling
          ers including customers, service providers, vendors, and   block  and  the  ever-intensifying  threat  scenario,  CISOs
          regulators. And such integrations can expose organiza-  now want to know the answers to pertinent questions
          tions to a host of malicious attacks & breaches. In addition   like the real-time risk posture of the company? Any Mis-
          to this, the emergence of lethal threats like ransomware   behaving users or Machine on the network? Indicators
          has rendered Security Operations Centers which rely pri-  in case the networks are compromised after making a

          50  | January, 2018            www.dqindia.com                 A CyberMedia Publication  |
   45   46   47   48   49   50   51   52   53   54   55