    <meta property="twitter:title" content="Threat Hunting: The What, Why and Who? - Palo Alto Networks Blog" />
    <meta property="twitter:description" content="Threats can be present in an organization's network or systems for several months before they are detected. Early detection is the key to minimizing the damages, which makes proactive threat hunting crucial. However, many SOCs are poorly equipped to hunt efficiently and effectively." />
{"version":"1.0","provider_name":"Palo Alto Networks Blog","provider_url":"https:\/\/www.paloaltonetworks.com.au\/blog","author_name":"Kamil Imtiaz","author_url":"https:\/\/www.paloaltonetworks.com.au\/blog\/author\/kamil-imtiaz\/","title":"Threat Hunting: The What, Why and Who? - Palo Alto Networks Blog","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"TWoIUGtiSY\"><a href=\"https:\/\/www.paloaltonetworks.com.au\/blog\/security-operations\/threat-hunting-the-what-why-and-who\/\">Threat Hunting: The What, Why and Who?<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.paloaltonetworks.com.au\/blog\/security-operations\/threat-hunting-the-what-why-and-who\/embed\/#?secret=TWoIUGtiSY\" width=\"600\" height=\"338\" title=\"&#8220;Threat Hunting: The What, Why and Who?&#8221; &#8212; Palo Alto Networks Blog\" data-secret=\"TWoIUGtiSY\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.paloaltonetworks.com.au\/blog\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.paloaltonetworks.com.au\/blog\/wp-content\/uploads\/2020\/02\/Cortex_XSOAR_illustration_Social_1_800x418.png","thumbnail_width":800,"thumbnail_height":418,"description":"Threats can be present in an organization's network or systems for several months before they are detected. Early detection is the key to minimizing the damages, which makes proactive threat hunting crucial. However, many SOCs are poorly equipped to hunt efficiently and effectively."}