opentext

Blog
Network Visibility is Foundational to Cyber Security's Vital Few
For more than a hundred years now the Pareto Principle has reminded us that the relationship between...
Read More
Blog
Experience Bricata Network Detection and Response in Minutes
Bricata Labs is a quick and easy way for security analysts and threat hunters to experience the full...
Read More
Blog
The Critical Role of Network Detection and Response in Improving Enterprise Security [Q&A with Vito Rallo of PwC]
Vito Rallo is Director of Cyber Incident and Threat Management at PwC. He and his team provide offensive...
Read More
Blog
Suricata or Zeek? The answer is both.
If you apply Pereto’s Principal (the 80/20 rule) to network security, about 80% of incidents are caused...
Read More
Blog
No data? No hunt. Top tips to ensure a successful threat hunting environment
Threat hunting continues to be a priority for security teams. Many organizations have plans to initiate...
Read More
Blog
Cybersecurity in the Age of Uncertainty
What is the new normal for security professionals in 2020? Hint: It involves protecting a larger attack...
Read More
Blog
Latest Version of the Bricata Network Security Platform Adds MITRE ATT&CK Support and Simplified Workflows
We recently announced the latest version of the Bricata Network Security platform. This update adds powerful...
Read More
Blog
Signs You Might Be Ready for an IDS Upgrade
When was the last time you assessed your Intrusion Detection System (IDS)? These solutions remain vitally...
Read More
Blog
Four Key Elements for Comprehensive Network Threat Detection
Today’s cybersecurity landscape is a mix of old and new threats. Many of the attacks that organizations...
Read More
Blog
Four Keys to Comprehensive Network Protection
According to IDC, worldwide security spending is expected to hit $133.8 billion by 2022, a CAGR of 9.2%...
Read More
Blog
Are Utilities Ready to Defend Against Industrial Cyber Threats?
Analyzing the cyber risk, readiness and preparation of utility companies
Read More
Blog
Zeek is Like a Box of LEGO Bricks for Network Security [Q&A with Dr. Ali Hadi]
Dr. Ali Hadi, a professor of cybersecurity, answers our questions and describes the Zeek framework as...
Read More