Insight While it is understandable for organizations to want to rely on purchased security products to find all instances of evil in their environment, it is just not possible. Security technology must be paired with a human element that thinks like an attacker. This is especially true when implementing threat hunting. Those threat hunters should understand the cyber kill chain (mentioned in our proactive monitoring article) to know what to look for in each phase. In fact, one might think of threat hunting as proactive monitoring on steroids-it is the next step in the evolution of shortening the time to detection. Hunting is the transformation of being purely reactive to becoming proactive in your detections.
Informationweek
The Year in Security: Adversarial AI and the Rush to the Cloud
Interop keynoter Gunter Ollmann, Microsoft s cloud and AI security leader, shares insights on 2020 s instant pivot to the cloud, the state of adversarial AI, and how top organizations can stop attackers.
Image: jirsak - stock.adobe.com
A global pandemic and its impact on the way we work and live served as a catalyst for enterprise digital transformation in 2020. The enterprise did two years worth of digital transformation in two months this year, according to Microsoft CEO Satya Nadella. But how did that acceleration of projects impact the security of the enterprise? Did smart security practices fall by the wayside?