Blog

Blog
Experience Bricata Network Detection and Response in Minutes
Bricata Labs is a quick and easy way for security analysts and threat hunters to experience the full...
Read More
Blog
The Critical Role of Network Detection and Response in Improving Enterprise Security [Q&A with Vito Rallo of PwC]
Vito Rallo is Director of Cyber Incident and Threat Management at PwC. He and his team provide offensive...
Read More
Blog
How Better Network Instrumentation Eliminates Security Risks – Q&A with Chief Product Officer Andre Ludwig
Today we’re discussing network instrumentation with Bricata Chief Product Officer Andre Ludwig. Our...
Read More
Blog
Now You Know – Q&A about Bricata with CEO John Trauth
Bricata CEO John Trauth discusses how Bricata is helping the world’s largest organizations secure their...
Read More
Blog
Suricata or Zeek? The answer is both.
If you apply Pereto’s Principal (the 80/20 rule) to network security, about 80% of incidents are caused...
Read More
Blog
No data? No hunt. Top tips to ensure a successful threat hunting environment
Threat hunting continues to be a priority for security teams. Many organizations have plans to initiate...
Read More
Blog
Cybersecurity in the Age of Uncertainty
What is the new normal for security professionals in 2020? Hint: It involves protecting a larger attack...
Read More
Blog
Latest Version of the Bricata Network Security Platform Adds MITRE ATT&CK Support and Simplified Workflows
We recently announced the latest version of the Bricata Network Security platform. This update adds powerful...
Read More
Blog
Signs You Might Be Ready for an IDS Upgrade
When was the last time you assessed your Intrusion Detection System (IDS)? These solutions remain vitally...
Read More
Blog
Cybersecurity Issues Abound During the COVID-19 Pandemic
Hackers around the world are taking advantage of the rapid, widespread changes in the workforce and people’s...
Read More
Blog
Four Key Elements for Comprehensive Network Threat Detection
Today’s cybersecurity landscape is a mix of old and new threats. Many of the attacks that organizations...
Read More
Blog
Getting Network Visibility into East-West Traffic
Getting highly granular “everywhere” visibility continues to be a significant challenge for organizations...
Read More