
Risky Biz Soap Box: Mike Wiacek on lazy mode threat hunting
Risky Business
Importance of File Analysis in Threat Detection
The chapter emphasizes the shift in approach from collecting logs to analyzing files for meaningful signals within large volumes of data, highlighting the value of ground truth data obtained from unique files on endpoints. It discusses the use of tools like Stairwell for threat hunting in enterprises and the trend of startups offering programmable security solutions. The chapter also addresses the importance of active threat analysis, collaboration with Endpoint Detection and Response systems, and the setup of automated tools for identifying potential threats within organizations.
00:00
Transcript
Play full episode
Remember Everything You Learn from Podcasts
Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.