Cybersecurity Salaries, Emerging Threat Vectors and Security Integration: The 10 Most Read Posts by Bricata on Cybersecurity in 2019

As the year winds down, we’ve identified our 2019 blog posts that drew the most interest. While we explore central network security topics, we also examine broader cybersecurity topics ranging from cybersecurity statistics and studies – to leadership and security culture.

Below are the most-read Bricata blog posts for 2019.

1) 6 Cybersecurity Salary Surveys: What’s a Security Pro Worth in 2019?

The national average salary for a cybersecurity position in the U.S. is $96,185 – yet there’s variance by level and geography. This post looks at six studies examining cybersecurity compensation.

2) What is Suricata? Intro to a Best of Breed Open Source IDS and IPS

Suricata is an open source intrusion detection (IDS), intrusion prevention (IPS), and network security monitoring engine.

3) 62 Articles, Blog Posts and Links that Summarize the 2019 RSA Conference

If there was a theme that emerged from the 2019 RSA Conference, we venture to say it was the human element in cybersecurity. The fatigue and stress of security jobs, the shortage of cybersecurity talent, and women in cybersecurity were all key themes that seemed to underscore many of the stories that emerged.

4) 5 Emerging Vectors of Attack and Recommendations for Mitigating the Risks

DNS manipulation, domain fronting, targeted cloud individual attacks and the exploitation of hardware features are among the emerging challenges adversaries can exploit according to cybersecurity experts at SANS.

5) Make it Harder to Hide: 3 Techniques for Conducting Threat Hunting at Scale

Since most attacks introduce something new into the environment, security can use the law of large numbers theorem to narrow down a massive amount of activity on a large network to just those transactions that seem out of place.

6) 3 Reasons Why the Integration of Cybersecurity Tools is a Growing Imperative

Cybersecurity integration is a growing imperative because it reduces inefficiency, accelerates detection and enables an organization to pick and choose the best-of-breed tools that meet the needs of their unique environment.

7) Considerations for Planning, Structuring and Deploying a New Network Security Strategy

Planning and deploying a new network security strategy should involve many departments across the business and multiple steps. This post offers key considerations.

8) Reasons Professionals Give for Why Network Security is Getting Harder

A survey found most cybersecurity professionals think the function of network security is getting harder. The survey also asked them “Why?” and this post reviews some of the common answers.

9) What the Top 25% of Cybersecurity Pros do Differently in Strategy, Risk and Communication

A benchmarking study found the top cybersecurity pros tend to be better aligned with business strategy, take a risk-based approach and communicate with leaders effectively.

10) Aligning Security with Patient Safety: 8 Insights for Healthcare Cybersecurity

The chances of shoring up healthcare cybersecurity with budget and staff, improve when security goals are aligned with healthcare goals, like patient safety.

* * *

Are there network security topics you’d like to see us tackle in 2020? Tweet us up @BricataInc.

Bricata has simplified the four critical capabilities security organizations need for comprehensive network protection: visibility, threat detection, threat hunting, and post-detection actions. If you’d like to see our solution in action, you are welcome to schedule a live demonstration.

If you enjoyed this post, you might also like:
Year in Review: 18 Cybersecurity Statistics and Research Figures Summarizing 2019

Back to Blog


Bricata Names John Becker Executive Chair of its Board of Directors
“We’re extremely pleased to have John in this board leadership role,” said Bricata CEO John Trauth.
+ +