intrusion detection

Blog
How Better Network Instrumentation Eliminates Security Risks – Q&A with Chief Product Officer Andre Ludwig
Today we’re discussing network instrumentation with Bricata Chief Product Officer Andre Ludwig. Our...
Read More
Blog
Open Source Security Software: Takeaways from a Case Study on DIY Fatigue
Open source security software can cause teams to spend more time maintaining a tool than securing their...
Read More
Blog
ZeekWeek 2019: 5 Things Network Security Pros Should Know about Zeek
As the annual ZeekWeek conference kicks off – here are X things network security professionals should...
Read More
Blog
The Benefits, Characteristics and Components of Flyaway Kits for Incident Response
Several different measures of effectiveness tell us incident response (IR) generally takes too long and...
Read More
Blog
What is Suricata? Intro to a Best of Breed Open Source IDS and IPS
“ESG research indicates network security monitoring is most often the center of gravity for threat...
Read More
Blog
Open Source Security Tools and Threat Hunting: The 10 Most Read Bricata Posts on Cybersecurity in 2018
Every week we publish a blog post where we dive into a topic or study around network security. In 2018,...
Read More
Blog
7 Security Trends Shaping Intrusion Detection Technology
The threat landscape has evolved and is shaping the need for innovation in intrusion detection. These...
Read More
Blog
This Independent Cybersecurity Product Review Doubles as an Outline for How to Start Threat Hunting with Existing Tools and Skills
This review serves as more than a demonstration of product capabilities – it also provides an outline...
Read More
Blog
Why the Legacy of IPS May Guide the Future of Threat Hunting
The history of intrusion prevention systems (IPS) in the context of evolving cyber threats is instructive...
Read More
Blog
Suricata, Snort and Zeek: 3 Open Source Technologies for Securing Modern Networks
Open source technology for network security and intrusion detection is evolving to meet new threats....
Read More
Blog
New Vulnerability? Begin Change Management to Patch and Start Monitoring for Exploits
The change management process to patch new vulnerabilities can take time, which sets off a race for transgressors...
Read More
Blog
3 Golden Opportunities to Mitigate Network Cyber Attacks
Effective network security provides 3 opportunities to detect and mitigate cyber threats: at the initial...
Read More