Network Security

Blog
Now You Know – Q&A about Bricata with CEO John Trauth
Bricata CEO John Trauth discusses how Bricata is helping the world’s largest organizations secure their...
Read More
Blog
No data? No hunt. Top tips to ensure a successful threat hunting environment
Threat hunting continues to be a priority for security teams. Many organizations have plans to initiate...
Read More
Blog
Signs You Might Be Ready for an IDS Upgrade
When was the last time you assessed your Intrusion Detection System (IDS)? These solutions remain vitally...
Read More
Blog
5 Security Trends and Predictions to Watch in 2020
The 2019 cybersecurity landscape was once again littered with attacks. From the resurgence of ransomware...
Read More
Blog
Zeek is Like a Box of LEGO Bricks for Network Security [Q&A with Dr. Ali Hadi]
Dr. Ali Hadi, a professor of cybersecurity, answers our questions and describes the Zeek framework as...
Read More
Blog
Use Cases of the Bricata Platform for Better Network Security
The Bricata platform supports a range of network security use cases from DIY fatigue to connecting networks...
Read More
Blog
Want to Learn Network Threat Hunting? Get Started with this Free Intro Course
Bricata has teamed up with Cybrary to offer a self-paced course on threat hunting that you can take for...
Read More
Blog
3 Cool New Network Security Features in the Bricata Platform you Might have Missed
Bricata recently released a new version of its network security product with several cool new features...
Read More
Blog
5 Network Security Takeaways from the 2019 Threatscape Report
The new threatscape report by Accenture iDefense highlights five factors shaping the cyberthreat landscape...
Read More
Blog
Cybersecurity Case Study: Securely Integrating a Business Network After a Merger and Acquisition
A healthcare company placed a Bricata threat detection appliance between their network and that of the...
Read More
Blog
14 Reasons Professionals Give for Why Network Security is Getting Harder
A survey found most cybersecurity professionals think the function of network security is getting harder....
Read More
Blog
Make it Harder to Hide: 3 Techniques for Conducting Threat Hunting at Scale
The law of large numbers theorem facilitates threat hunting at scale on large networks because it isolates...
Read More