behavior detection

Blog
ZeekWeek 2019: 5 Things Network Security Pros Should Know about Zeek
As the annual ZeekWeek conference kicks off – here are X things network security professionals should...
Read More
Blog
Make it Harder to Hide: 3 Techniques for Conducting Threat Hunting at Scale
The law of large numbers theorem facilitates threat hunting at scale on large networks because it isolates...
Read More
Blog
5 Fundamentals for Mitigating the Risk of Laterally Spreading Malware
The persistent risk of laterally spreading malware requires good execution of network security fundamentals...
Read More
Blog
The Top 10 Network Security Challenges in 2019
Most security professionals say network security is harder this year when compared to last year – according...
Read More
Blog
Network Visibility: Can You Analyze Encrypted Traffic for Cybersecurity Threats?
We get this question a lot: Can you analyze encrypted traffic for cyber threats? It just came up again...
Read More
Blog
The Bro Project Renames Bro IDS to Zeek IDS
One of the most powerful cybersecurity tools you have never heard of just got a new name. The team leading...
Read More
Blog
Network Security: Why it’s Harder for Threats to Hide Behavior
If signatures in cybersecurity are like fingerprints in a criminal investigation, behavioral detection...
Read More
Blog
How Zeek IDS can Help Security Capture Institutional Knowledge for Cyber Alert Enrichment and Better Network Traffic Analysis
A presentation at BroCon will demonstrate how Bro IDS can be used to capture institutional knowledge...
Read More
Blog
Layers of Cybersecurity: Signature Detection vs. Network Behavioral Analysis
Signature-based detection is effective at identifying known threats but comes with inherent limitations:...
Read More