{"id":10438,"date":"2018-08-23T12:09:31","date_gmt":"2018-08-23T12:09:31","guid":{"rendered":"https:\/\/blog.trendmicro.com\/?p=541852"},"modified":"2018-08-23T12:09:31","modified_gmt":"2018-08-23T12:09:31","slug":"simplifying-and-prioritizing-advanced-threat-response-measures","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/simplifying-and-prioritizing-advanced-threat-response-measures\/","title":{"rendered":"Simplifying and Prioritizing Advanced Threat Response Measures"},"content":{"rendered":"<div class=\"post-text\" readability=\"59.818548387097\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"264\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/08\/20180413044902945-250-ovdsit9-800-300x264.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/08\/20180413044902945-250-ovdsit9-800-300x264.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/08\/20180413044902945-250-ovdsit9-800-768x676.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/08\/20180413044902945-250-ovdsit9-800-640x563.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/08\/20180413044902945-250-ovdsit9-800-440x387.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/08\/20180413044902945-250-ovdsit9-800-380x334.jpg 380w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/08\/20180413044902945-250-ovdsit9-800.jpg 800w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\"\/><\/p>\n<p>I had to go to the doctor the other day because I was miserable and sick. I don\u2019t like going to the doctor so I waited until my stuffy nose and congestion turned into a full blown sinus infection. The doctor said this thing was going around, and I should be better in a few day with my prescription. Where did I catch this demon inside my face?\u00a0 Was it the plane?\u00a0 Was it the hand rail on the shuttle bus? Was it the gas station pump? Was it my kids? Wouldn\u2019t it great if you could ask your doctor, \u201cSo doc where did I catch this?\u201d and have the doctor say, \u201cOh you picked this up from the shopping cart at the grocery store on 4<sup>th<\/sup> Street, and it look like 25 other people caught it too.\u201d<\/p>\n<p>Your doctor can\u2019t do this yet but IT security professions can.<\/p>\n<p>Trend Micro r<a href=\"https:\/\/newsroom.trendmicro.com\/press-release\/commercial\/trend-micro-simplifies-advanced-threat-detection-and-network-analysis\">ecently introduced<\/a> advanced analytics capabilities for its network security solution, Deep Discovery\u2122. These new capabilities will help IT security professionals understand more about the attacks on their networks. By correlating the event data from <a href=\"https:\/\/www.trendmicro.com\/en_us\/business\/products\/network\/advanced-threat-protection\/inspector.html\">Deep Discovery Inspector<\/a>, <a href=\"https:\/\/www.trendmicro.com\/en_us\/business\/products\/network\/advanced-threat-protection\/deep-discovery-threat-intelligence-network-analytics.html\">Deep Discovery Director \u2013 Network Analytics<\/a> will simplify and help prioritize advanced threat response measures for security professionals. Essentially allowing them to answer the question I was asking my doctor above. Where did I catch this? But it won\u2019t stop there. Deep Discovery Director \u2013 Network Analytics will not only show the first point of infection, but it will also track where the threat has spread \u2013 showing who else has been impacted, and what external severs it is reaching out to such as command and control servers. As many attacks take place over several days, it is hard to comb through all the events and logs to piece together an entire attack. Now with a click of the mouse it will show the entire attack life cycle going back 90 days. This visibility and real-time reporting can be invaluable when management is asking for details about the latest threats or outbreak.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-541867\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/08\/blog-image-1024x576.jpg\" alt=\"\" width=\"1024\" height=\"576\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/08\/blog-image-1024x576.jpg 1024w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/08\/blog-image-300x169.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/08\/blog-image-768x432.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/08\/blog-image-640x360.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/08\/blog-image-900x506.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/08\/blog-image-440x247.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/08\/blog-image-380x214.jpg 380w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/08\/blog-image.jpg 1432w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\"\/><\/p>\n<p>Attacks that slip past perimeter protection solutions can go undetected in the network for months on average.\u00a0<a href=\"http:\/\/www.trendmicro.com\/en_us\/business\/products\/network\/advanced-threat-protection\/inspector.html?modal=sb-weak-link-f72378\">Lateral movement<\/a> detection should be a top priority, however most advanced threat solutions only monitor north\/south traffic. Deep Discovery Inspector will monitor <a href=\"http:\/\/www.trendmicro.com\/en_us\/business\/products\/network\/advanced-threat-protection.html?modal=39b697\">north\/south and east\/west traffic<\/a> with the same device. This reduces the number of devices and all the management and logistics that go along with them. As seen in the screen shot above lateral movement is a key part of this attack and if it is not monitored the threat can spread across the network unbeknownst to the security team.<\/p>\n<p>If you are using Deep Discovery Inspector to monitor your network ask your Trend Micro contact about Deep Discovery Director \u2013 Network Analytics and see how it can help you correlate, prioritize and simplify the events reported by Deep Discovery Inspector.<\/p>\n<p>If you using another product for advanced threat detection consider using Deep Discovery to help augment your current deployment by monitor the east\/west traffic and provide threat analytics, while your existing solution monitors the north\/south traffic.<\/p>\n<p>It is never too late to get a second opinion.<\/p>\n<\/p><\/div>\n<p> Read More <a href=\"https:\/\/blog.trendmicro.com\/deepdiscovery-network-analyzer\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>I had to go to the doctor the other day because I was miserable and sick. I don\u2019t like going to the doctor so I waited until my stuffy nose and congestion turned into a full blown sinus infection. The doctor said this thing was going around, and I should be better in a few&#8230;<br \/>\nThe post Simplifying and Prioritizing Advanced Threat Response Measures appeared first on . Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":10439,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[375,1415,306,2926,307],"class_list":["post-10438","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-business","tag-deep-discovery","tag-network","tag-network-analyzer","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Simplifying and Prioritizing Advanced Threat Response Measures 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/simplifying-and-prioritizing-advanced-threat-response-measures\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Simplifying and Prioritizing Advanced Threat Response Measures 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/simplifying-and-prioritizing-advanced-threat-response-measures\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-08-23T12:09:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/08\/simplifying-and-prioritizing-advanced-threat-response-measures.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"264\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/simplifying-and-prioritizing-advanced-threat-response-measures\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/simplifying-and-prioritizing-advanced-threat-response-measures\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Simplifying and Prioritizing Advanced Threat Response Measures\",\"datePublished\":\"2018-08-23T12:09:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/simplifying-and-prioritizing-advanced-threat-response-measures\\\/\"},\"wordCount\":538,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/simplifying-and-prioritizing-advanced-threat-response-measures\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/08\\\/simplifying-and-prioritizing-advanced-threat-response-measures.jpg\",\"keywords\":[\"Business\",\"Deep Discovery\",\"Network\",\"Network Analyzer\",\"Security\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/simplifying-and-prioritizing-advanced-threat-response-measures\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/simplifying-and-prioritizing-advanced-threat-response-measures\\\/\",\"name\":\"Simplifying and Prioritizing Advanced Threat Response Measures 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/simplifying-and-prioritizing-advanced-threat-response-measures\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/simplifying-and-prioritizing-advanced-threat-response-measures\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/08\\\/simplifying-and-prioritizing-advanced-threat-response-measures.jpg\",\"datePublished\":\"2018-08-23T12:09:31+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/simplifying-and-prioritizing-advanced-threat-response-measures\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/simplifying-and-prioritizing-advanced-threat-response-measures\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/simplifying-and-prioritizing-advanced-threat-response-measures\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/08\\\/simplifying-and-prioritizing-advanced-threat-response-measures.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/08\\\/simplifying-and-prioritizing-advanced-threat-response-measures.jpg\",\"width\":300,\"height\":264},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/simplifying-and-prioritizing-advanced-threat-response-measures\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Business\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/business\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Simplifying and Prioritizing Advanced Threat Response Measures\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Simplifying and Prioritizing Advanced Threat Response Measures 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/simplifying-and-prioritizing-advanced-threat-response-measures\/","og_locale":"en_US","og_type":"article","og_title":"Simplifying and Prioritizing Advanced Threat Response Measures 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/simplifying-and-prioritizing-advanced-threat-response-measures\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-08-23T12:09:31+00:00","og_image":[{"width":300,"height":264,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/08\/simplifying-and-prioritizing-advanced-threat-response-measures.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/simplifying-and-prioritizing-advanced-threat-response-measures\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/simplifying-and-prioritizing-advanced-threat-response-measures\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Simplifying and Prioritizing Advanced Threat Response Measures","datePublished":"2018-08-23T12:09:31+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/simplifying-and-prioritizing-advanced-threat-response-measures\/"},"wordCount":538,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/simplifying-and-prioritizing-advanced-threat-response-measures\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/08\/simplifying-and-prioritizing-advanced-threat-response-measures.jpg","keywords":["Business","Deep Discovery","Network","Network Analyzer","Security"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/simplifying-and-prioritizing-advanced-threat-response-measures\/","url":"https:\/\/www.threatshub.org\/blog\/simplifying-and-prioritizing-advanced-threat-response-measures\/","name":"Simplifying and Prioritizing Advanced Threat Response Measures 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/simplifying-and-prioritizing-advanced-threat-response-measures\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/simplifying-and-prioritizing-advanced-threat-response-measures\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/08\/simplifying-and-prioritizing-advanced-threat-response-measures.jpg","datePublished":"2018-08-23T12:09:31+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/simplifying-and-prioritizing-advanced-threat-response-measures\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/simplifying-and-prioritizing-advanced-threat-response-measures\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/simplifying-and-prioritizing-advanced-threat-response-measures\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/08\/simplifying-and-prioritizing-advanced-threat-response-measures.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/08\/simplifying-and-prioritizing-advanced-threat-response-measures.jpg","width":300,"height":264},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/simplifying-and-prioritizing-advanced-threat-response-measures\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Business","item":"https:\/\/www.threatshub.org\/blog\/tag\/business\/"},{"@type":"ListItem","position":3,"name":"Simplifying and Prioritizing Advanced Threat Response Measures"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/10438","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=10438"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/10438\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/10439"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=10438"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=10438"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=10438"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}