In this article, we argue that the "Threat Hunting vs Detection Engineering" debate is outdated and doesn't help us improve cybersecurity. We believe security operations should be seen as a connected data pipeline, not isolated roles. We introduce the Active Defence Pipeline (R1D3) model to illustrate this, emphasizing the importance of data flow and collaboration over rigid job titles.
Threat Hunting vs Detection Engineering? The…
In this article, we argue that the "Threat Hunting vs Detection Engineering" debate is outdated and doesn't help us improve cybersecurity. We believe security operations should be seen as a connected data pipeline, not isolated roles. We introduce the Active Defence Pipeline (R1D3) model to illustrate this, emphasizing the importance of data flow and collaboration over rigid job titles.