This article is a part of my series 'Security is our duty and we shall deliver it'
Threat hunting is a very deep and strong method to deal with
security issues in markets and solutions that need stringent regulations,
policies and have risks involved. It is the process of proactively and
iteratively searching through networks to detect and isolate advanced threats
that evade existing security solutions. According to SANS institute, the threat
hunters are actively searching for threats to prevent or minimize damage. The
formal process of threat hunting should not be confused with an attempt to prevent
adversaries from breaching the environment or for defenders to eliminate
vulnerabilities in the network.
We employ SIEM tools typically only provide indicators at
relatively low semantic levels. There is therefore a need to develop SIEM tools
that can provide threat indicators at higher semantic levels. As the industry
itself is developing around it, we also have our feets wet in the process. We
have our Chief Security consultant actively involved in all the three methods
viz. Analytics-Driven, situational-Awareness Driven and Intelligence-Driven. As
an accompalished engineer he is a master of monkey and fuzzy tests as well.
For bug logging and defect tracking we use home grown
technologies as well as Atlassian tools like Jira. For the cyclical practice of
identifying, classifying, remediating, and mitigating vulnerabilities, i.e
Vulnerability management we have adept leaders to lead and guide teams in teams
in using vulnerability scanners. We have successfully employed Coverity and
various checkstyles and PMD level rules.
We have a set of our own scripts and
systems to analyze and investigate for known vulnerabilities such as open
ports, insecure software configurations, and susceptibility to malware
infections. Like stated above, we have masters of fuzzer techniques who can
work with us 24x7. Unknown vulnerabilities, such as a zero-day, and complex
threats are all under our hand. We have consultants worked with a variety of
antivirus software and heuristic analysis mechanisms. You remember we said, we
have smartest of security consultants!
You can read and download the article from:
https://www.slideshare.net/toughjamy/security-is-our-duty-and-we-shall-deliver-it-white-paper
Read on LinkedIn:
https://www.linkedin.com/pulse/security-our-duty-we-shall-deliver-mohd-anwar-jamal-faiz/
You can read and download the article from:
https://www.slideshare.net/toughjamy/security-is-our-duty-and-we-shall-deliver-it-white-paper
Read on LinkedIn:
https://www.linkedin.com/pulse/security-our-duty-we-shall-deliver-mohd-anwar-jamal-faiz/
No comments:
Post a Comment