The dotted lines between Threat Hunting and Detection Engineering
There's no way out, the practices of Detection Engineering and Threat Hunting are becoming utterly important within a Cyber Security Program.
How to define boundaries and establish ownership of the processes involved? Where's the overlap? Read along for some insights from the field.
Give me a hunt, I give you a detection
I have been writing about Detection Engineering for some years but never had the need to formally define it as the name…