The dotted lines between Threat Hunting and Detection Engineering

There's no way out, the practices of Detection Engineering and Threat Hunting are becoming utterly important within a Cyber Security Program.

How to define boundaries and establish ownership of the processes involved? Where's the overlap? Read along for some insights from the field.

Give me a hunt, I give you a detection

I have been writing about Detection Engineering for some years but never had the need to formally define it as the name…

--

--

Blueteamer. Love logz. Threat Detection Engineering & Security Analytics. Independent contractor. Opstune.com #followback

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Alex Teixeira

Blueteamer. Love logz. Threat Detection Engineering & Security Analytics. Independent contractor. Opstune.com #followback