IPS

Blog
Open Source Security Software: Takeaways from a Case Study on DIY Fatigue
Open source security software can cause teams to spend more time maintaining a tool than securing their...
Read More
Blog
6 Tips for Building an Effective SOC
A presentation from RSA Unplugged 2019 offers several tips to security leaders seeking to build or improve...
Read More
Blog
7 Threat Hunting Benchmarks from a Survey of Security Pros
Threat hunting aims to find threats that didn’t trigger an alert, yet it’s still a new concept for...
Read More
Blog
What is Suricata? Intro to a Best of Breed Open Source IDS and IPS
“ESG research indicates network security monitoring is most often the center of gravity for threat...
Read More
Blog
Open Source Security Tools and Threat Hunting: The 10 Most Read Bricata Posts on Cybersecurity in 2018
Every week we publish a blog post where we dive into a topic or study around network security. In 2018,...
Read More
Blog
7 Security Trends Shaping Intrusion Detection Technology
The threat landscape has evolved and is shaping the need for innovation in intrusion detection. These...
Read More
Blog
This Independent Cybersecurity Product Review Doubles as an Outline for How to Start Threat Hunting with Existing Tools and Skills
This review serves as more than a demonstration of product capabilities – it also provides an outline...
Read More
Blog
Cybersecurity Must be Both Strategic and Tactical: 7 Takeaways from a Webinar for Healthcare Security Pros
Healthcare struggles to get complete visibility into the IT infrastructure because it’s often an eclectic...
Read More
Blog
Threat Evolution and the Economics of Cybersecurity [Q&A with John Pirc, Author and Security Expert]
Threats change and evolve, and security has to adapt to meet new concerns. John Pirc, Security Expert...
Read More
Blog
Why the Legacy of IPS May Guide the Future of Threat Hunting
The history of intrusion prevention systems (IPS) in the context of evolving cyber threats is instructive...
Read More
Blog
Suricata, Snort and Zeek: 3 Open Source Technologies for Securing Modern Networks
Open source technology for network security and intrusion detection is evolving to meet new threats....
Read More
Blog
IDS is Dead! Long Live IDS! An Analyst Prediction from 2003 Remains Relevant
The same complicated factors around intrusion detection systems in 2003 that prompted a technology analyst...
Read More