The Top 10 Network Security Challenges in 2019
Most security professionals say network security is harder this year when compared to last year – according to a survey we recently conducted ... Read More
3 Reasons Why the Integration of Cybersecurity Tools is a Growing Imperative
In cybersecurity, the whole of security data is greater than the sum of its parts. Unfortunately, the way many security products are engineered, ... Read More
13 Grounded and Realistic Cybersecurity Predictions for 2019 [Roundup]
“The AI security software has malicious intent.” That was Kelly Shortridge’s second prediction on a humorous list of 2019 predictions for cybersecurity published ... Read More
Open Source Security Tools and Threat Hunting: The 10 Most Read Bricata Posts on Cybersecurity in 2018
Every week we publish a blog post where we dive into a topic or study around network security. In 2018, we even produced ... Read More
15 Cybersecurity Statistics Summarizing the Intense Year the Community had in 2018
If there was a common denominator across the cybersecurity community in 2018, it was this: everything got more intense. The volume of attacks, ... Read More
Amid AI and Machine Learning, the Human Touch Remains Crucial to Cybersecurity in 2019, New Network Security Survey Finds
Amid the fervor over artificial intelligence (AI) and machine learning, it’s easy to lose sight of just how important human involvement is in ... Read More
How Enhanced Network Metadata Resolution Facilitates Network Threat Hunting
We recently announced a new version of our product – Bricata Delivers Improved Threat Hunting with Enhanced Network Metadata Resolution, Scalability, and View ... Read More
Bricata Named to the Inaugural NVTC Tech 100 by the Northern Virginia Tech Council
Network Security Provider Recognized Among Technology Companies and Individuals NVTC Sees as Driving Growth in the Greater Washington Region December 6, 2018 – ... Read More
Network Visibility: Can You Analyze Encrypted Traffic for Cybersecurity Threats?
We get this question a lot: Can you analyze encrypted traffic for cyber threats? It just came up again during the question and ... Read More
Here is How Open Source DIY Fatigue Saps Cybersecurity Resources
Open source security tools often start as cost-saving DIY projects inside cybersecurity organizations, but as the network grows, these take more time to maintain and manage, which detracts from the task of actually protecting the network ... Read More