Threat Hunting
Searching for advanced, persistent threats and sophisticated adversaries, as well as sweeping for indicators of compromise and indicators of attack.
Account compromise
Application security
Data loss monitoring
Endpoint security
Network security
searcharticle