Threat hunting: When to hunt, and who should do it
Insights from RSA on how to hunt threats in corporate infrastructure