{"id":50914,"date":"2023-03-07T12:12:00","date_gmt":"2023-03-07T12:12:00","guid":{"rendered":"https:\/\/www.csoonline.com\/article\/3689700\/akamai-releases-new-threat-hunting-tool-backed-by-guardicore-capabilities.html#tk.rss_security"},"modified":"2023-03-07T12:12:00","modified_gmt":"2023-03-07T12:12:00","slug":"akamai-releases-new-threat-hunting-tool-backed-by-guardicore-capabilities","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/akamai-releases-new-threat-hunting-tool-backed-by-guardicore-capabilities\/","title":{"rendered":"Akamai releases new threat hunting tool backed by Guardicore capabilities"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2023\/03\/corporate-security-insider-threat-hacker-spy-cybersecurity-human-resources-100938221-large.jpg?auto=webp&amp;quality=85,70\" class=\"ff-og-image-inserted\"><\/div>\n<p>Akamai on Tuesday launched Akamai Hunt, a visibility tool that uses the infrastructure of <a href=\"https:\/\/www.networkworld.com\/article\/3247672\/what-is-microsegmentation-how-getting-granular-improves-network-security.html\">microsegmentation<\/a> platform <a href=\"https:\/\/www.csoonline.com\/article\/3233946\/guardicore-centra-provides-visibility-protection-through-advanced-micro-segmentation.html\">Guardicore<\/a> to allow customers to identify and remediate threats and risks in their cloud environments.<\/p>\n<p>Akamai acquired Guardicore in October 2022 for about $600 million. Akamai Hunt combines Akamai\u2019s historic data with Guardicore\u2019s network segmentation and visualization capabilities to help identify and eliminate threats.<\/p>\n<p>\u201cAn earlier version of Hunt was available through Guardicore to a limited set of customers,\u201d Pavel Gurvich, senior vice president and general manager of Akamai\u2019s Enterprise Security Group said. \u201cNow, as part of Akamai&#8217;s integration of Guardicore\u2019s technology and telemetry, we have scaled, expanded, and enhanced the service to meet broader demand from customers with larger environments.\u201d<\/p>\n<h2>Hunt combines in-house telemetry with global threat data<\/h2>\n<p>Hunt identifies threats and risks by analyzing telemetry data from Akamai customer\u2019s environment and cross-referencing it with high-priority global threat intelligence.&nbsp;It performs big data analytics on the combined data to query suspicious and anomalous activities<\/p>\n<p>\u201cThe acquisition also opened up access to a very large data set of attacks, seen through Akamai\u2019s global domain naming system (<a href=\"https:\/\/www.networkworld.com\/article\/3268449\/what-is-dns-and-how-does-it-work.html\">DNS<\/a>), web application firewall (<a href=\"https:\/\/www.csoonline.com\/article\/3324244\/what-is-a-waf-12-top-web-application-firewalls-compared.html\">WAF<\/a>) and distributed denial of service attack (<a href=\"https:\/\/www.csoonline.com\/article\/3648530\/ddos-attacks-definition-examples-and-techniques.html\">DDoS<\/a>) footprints, that have improved Hunt\u2019s detection abilities,\u201d Gurvich said. \u201cIn addition to this new, massive scale, Akamai Hunt is built on an improved engine architecture that runs 100 times faster than before and handles the collection and analysis of events to reduce time to detection.\u201d<\/p>\n<p>Hunt has dedicated security experts to assist customer security operation centers (<a href=\"https:\/\/www.csoonline.com\/article\/3658230\/soc-modernization-8-key-considerations.html\">SOCs<\/a>) in the remediation of threats, patching of vulnerabilities, and hardening of IT infrastructures.<\/p>\n<aside class=\"nativo-promo nativo-promo-1 smartphone\" id> <\/aside>\n<p>Hunt also features alerts and monthly reports for just-in-time mitigation and an overview of monthly incidents.<\/p>\n<h2>Agentless segmentation to enforce zero trust across IoT\/OT<\/h2>\n<p>Akamai has also announced the release of \u201cagentless\u201d segmentation on Akamai Guardicore Segmentation to extend zero trust support to its customers with connected IoT and OT devices, which are not capable of running host-based security software.<\/p>\n<aside class=\"nativo-promo nativo-promo-1 tablet desktop\" id> <\/aside>\n<p>The agentless capability will be available for Akamai Guardicore Segmentation customers in the second quarter of 2023 and will automate new IoT\/OT device onboarding, device fingerprinting, and least privilege segmentation.<\/p>\n<p>This would essentially enable the platform to automatically discover new network-connected devices and execute predefined device onboarding workflows, enforce fine-grained security policies across device line up, and employ least privilege segmentation policies to quarantine suspicious devices through direct integration with network control points.<\/p>\n<p>\u201cThe need for segmentation for devices that aren\u2019t capable of running host-based security software is a concern we increasingly hear about from customers and partners,\u201d Gurvich said. \u201cIt\u2019s safe to say that almost all of our customers from the healthcare, manufacturing, education and financial industries have IoT\/OT\/MIoT environments they want protected the same way their other workloads are protected with <a href=\"https:\/\/www.csoonline.com\/article\/3247848\/what-is-zero-trust-a-model-for-more-effective-security.html\">Zero Trust<\/a> security policies.\u201d<\/p>\n<p>The enhancement will add an alert for \u201croaming\u201d devices as they move between different areas of a company&#8217;s wired and wireless network infrastructure.<\/p>\n<aside class=\"nativo-promo nativo-promo-2 tablet desktop smartphone\" id> <\/aside>\n<div class=\"end-note\"> <!-- blx4 #2004 blox4.html --> <\/p>\n<div id class=\"blx blxParticleendnote blxM2004 blox4_html blxC51120\">\n<aside> <strong>Next read this<\/strong> <\/aside>\n<\/p><\/div>\n<\/p><\/div>\n<p> READ MORE <a href=\"https:\/\/www.csoonline.com\/article\/3689700\/akamai-releases-new-threat-hunting-tool-backed-by-guardicore-capabilities.html#tk.rss_security\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Akamai Hunt combines the company\u2019s historic DNS, WAF, and DDoS data with Guardicore\u2019s segmentation and telemetry to detect and eliminate evasive threats. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":50915,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[738],"tags":[536,6946],"class_list":["post-50914","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-networkworld","tag-cloud-security","tag-threat-and-vulnerability-management"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Akamai releases new threat hunting tool backed by Guardicore capabilities 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/akamai-releases-new-threat-hunting-tool-backed-by-guardicore-capabilities\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Akamai releases new threat hunting tool backed by Guardicore capabilities 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/akamai-releases-new-threat-hunting-tool-backed-by-guardicore-capabilities\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-07T12:12:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/images.idgesg.net\/images\/article\/2023\/03\/corporate-security-insider-threat-hacker-spy-cybersecurity-human-resources-100938221-large.jpg?auto=webp&amp;quality=85,70\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/akamai-releases-new-threat-hunting-tool-backed-by-guardicore-capabilities\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/akamai-releases-new-threat-hunting-tool-backed-by-guardicore-capabilities\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Akamai releases new threat hunting tool backed by Guardicore capabilities\",\"datePublished\":\"2023-03-07T12:12:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/akamai-releases-new-threat-hunting-tool-backed-by-guardicore-capabilities\\\/\"},\"wordCount\":512,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/akamai-releases-new-threat-hunting-tool-backed-by-guardicore-capabilities\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/akamai-releases-new-threat-hunting-tool-backed-by-guardicore-capabilities.jpg\",\"keywords\":[\"Cloud Security\",\"Threat and Vulnerability Management\"],\"articleSection\":[\"Networkworld\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/akamai-releases-new-threat-hunting-tool-backed-by-guardicore-capabilities\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/akamai-releases-new-threat-hunting-tool-backed-by-guardicore-capabilities\\\/\",\"name\":\"Akamai releases new threat hunting tool backed by Guardicore capabilities 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/akamai-releases-new-threat-hunting-tool-backed-by-guardicore-capabilities\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/akamai-releases-new-threat-hunting-tool-backed-by-guardicore-capabilities\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/akamai-releases-new-threat-hunting-tool-backed-by-guardicore-capabilities.jpg\",\"datePublished\":\"2023-03-07T12:12:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/akamai-releases-new-threat-hunting-tool-backed-by-guardicore-capabilities\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/akamai-releases-new-threat-hunting-tool-backed-by-guardicore-capabilities\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/akamai-releases-new-threat-hunting-tool-backed-by-guardicore-capabilities\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/akamai-releases-new-threat-hunting-tool-backed-by-guardicore-capabilities.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/akamai-releases-new-threat-hunting-tool-backed-by-guardicore-capabilities.jpg\",\"width\":150,\"height\":100},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/akamai-releases-new-threat-hunting-tool-backed-by-guardicore-capabilities\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cloud Security\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/cloud-security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Akamai releases new threat hunting tool backed by Guardicore capabilities\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Akamai releases new threat hunting tool backed by Guardicore capabilities 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/akamai-releases-new-threat-hunting-tool-backed-by-guardicore-capabilities\/","og_locale":"en_US","og_type":"article","og_title":"Akamai releases new threat hunting tool backed by Guardicore capabilities 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/akamai-releases-new-threat-hunting-tool-backed-by-guardicore-capabilities\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-03-07T12:12:00+00:00","og_image":[{"url":"https:\/\/images.idgesg.net\/images\/article\/2023\/03\/corporate-security-insider-threat-hacker-spy-cybersecurity-human-resources-100938221-large.jpg?auto=webp&amp;quality=85,70","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/akamai-releases-new-threat-hunting-tool-backed-by-guardicore-capabilities\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/akamai-releases-new-threat-hunting-tool-backed-by-guardicore-capabilities\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Akamai releases new threat hunting tool backed by Guardicore capabilities","datePublished":"2023-03-07T12:12:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/akamai-releases-new-threat-hunting-tool-backed-by-guardicore-capabilities\/"},"wordCount":512,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/akamai-releases-new-threat-hunting-tool-backed-by-guardicore-capabilities\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/03\/akamai-releases-new-threat-hunting-tool-backed-by-guardicore-capabilities.jpg","keywords":["Cloud Security","Threat and Vulnerability Management"],"articleSection":["Networkworld"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/akamai-releases-new-threat-hunting-tool-backed-by-guardicore-capabilities\/","url":"https:\/\/www.threatshub.org\/blog\/akamai-releases-new-threat-hunting-tool-backed-by-guardicore-capabilities\/","name":"Akamai releases new threat hunting tool backed by Guardicore capabilities 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/akamai-releases-new-threat-hunting-tool-backed-by-guardicore-capabilities\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/akamai-releases-new-threat-hunting-tool-backed-by-guardicore-capabilities\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/03\/akamai-releases-new-threat-hunting-tool-backed-by-guardicore-capabilities.jpg","datePublished":"2023-03-07T12:12:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/akamai-releases-new-threat-hunting-tool-backed-by-guardicore-capabilities\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/akamai-releases-new-threat-hunting-tool-backed-by-guardicore-capabilities\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/akamai-releases-new-threat-hunting-tool-backed-by-guardicore-capabilities\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/03\/akamai-releases-new-threat-hunting-tool-backed-by-guardicore-capabilities.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/03\/akamai-releases-new-threat-hunting-tool-backed-by-guardicore-capabilities.jpg","width":150,"height":100},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/akamai-releases-new-threat-hunting-tool-backed-by-guardicore-capabilities\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Cloud Security","item":"https:\/\/www.threatshub.org\/blog\/tag\/cloud-security\/"},{"@type":"ListItem","position":3,"name":"Akamai releases new threat hunting tool backed by Guardicore capabilities"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/50914","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=50914"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/50914\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/50915"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=50914"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=50914"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=50914"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}