signature detection

Blog
5 Fundamentals for Mitigating the Risk of Laterally Spreading Malware
The persistent risk of laterally spreading malware requires good execution of network security fundamentals...
Read More
Blog
Network Security: Why it’s Harder for Threats to Hide Behavior
If signatures in cybersecurity are like fingerprints in a criminal investigation, behavioral detection...
Read More
Blog
Fileless Attacks Reinforce the Need for Multiple Methods of Detection [infographic]
Fileless attacks evade traditional signature detection methods because these are launched from memory....
Read More
Blog
7 Security Trends Shaping Intrusion Detection Technology
The threat landscape has evolved and is shaping the need for innovation in intrusion detection. These...
Read More
Blog
Layers of Cybersecurity: Signature Detection vs. Network Behavioral Analysis
Signature-based detection is effective at identifying known threats but comes with inherent limitations:...
Read More
Blog
4 Considerations for Evaluating an Intrusion Detection System
 by Kent Wilson The cybersecurity landscape is cluttered with tools, many of which are difficult to...
Read More
Blog
Where Have All The Good Signatures Gone?
It’s been over a decade since I’ve worked directly for an IDS/IPS company and in one of my (few)...
Read More