(Source: CSO Online) New security automation solutions can apply this approach to threat hunting, ranking events by order of severity, raising alerts to any suspicious events that the softwarehas deemed suspicious or an outright threat, and enabling SOC teams to focus immediately on the most critical threats before they can inflict damage.