SBN

Introducing the book: The Security Analyst’s Guide to Suricata

Introducing the book: The Security Analyst’s Guide to Suricata

In this Help Net Security video interview, Eric Leblond, CTO at Stamus Networks, talks about The Security Analyst’s Guide to Suricata, a book he co-wrote with Peter Manev. Key fast facts that can be learned from their work: How Suricata can be leveraged to provide deep insights into Windows host activities without agents or access to the logs How to leverage modern Suricata to go beyond signature-based threat detection to simultaneously produce protocol and file … More

The post Introducing the book: The Security Analyst’s Guide to Suricata appeared first on Help Net Security.

Leer másHelp Net Security

In this Help Net Security video interview, Eric Leblond, CTO at Stamus Networks, talks about The Security Analyst’s Guide to Suricata, a book he co-wrote with Peter Manev. Key fast facts that can be learned from their work: How Suricata can be leveraged to provide deep insights into Windows host activities without agents or access to the logs How to leverage modern Suricata to go beyond signature-based threat detection to simultaneously produce protocol and file … More →
The post Introducing the book: The Security Analyst’s Guide to Suricata appeared first on Help Net Security.

La entrada Introducing the book: The Security Analyst’s Guide to Suricata se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

*** This is a Security Bloggers Network syndicated blog from CISO2CISO.COM & CYBER SECURITY GROUP authored by Help Net Security. Read the original post at: https://ciso2ciso.com/introducing-the-book-the-security-analysts-guide-to-suricata/