threat detection

Blog
Suricata or Zeek? The answer is both.
If you apply Pereto’s Principal (the 80/20 rule) to network security, about 80% of incidents are caused...
Read More
Blog
No data? No hunt. Top tips to ensure a successful threat hunting environment
Threat hunting continues to be a priority for security teams. Many organizations have plans to initiate...
Read More
Blog
Four Key Elements for Comprehensive Network Threat Detection
Today’s cybersecurity landscape is a mix of old and new threats. Many of the attacks that organizations...
Read More
Blog
Getting Network Visibility into East-West Traffic
Getting highly granular “everywhere” visibility continues to be a significant challenge for organizations...
Read More
Blog
7 Threat Hunting Benchmarks from a Survey of Security Pros
Threat hunting aims to find threats that didn’t trigger an alert, yet it’s still a new concept for...
Read More
Blog
The Important Distinction between Threat Hunting and “True” Threat Hunting
With all the market buzz surrounding threat hunting, many network security technologies are now touting...
Read More