Bricata - Network Threat Hunting Simplified

The Top 10 Network Security Challenges in 2019

Most security professionals say network security is harder this year when compared to last year – according to a survey we recently conducted ... Read More
3 Reasons Why the Integration of Cybersecurity Tools is a Growing Imperative

3 Reasons Why the Integration of Cybersecurity Tools is a Growing Imperative

In cybersecurity, the whole of security data is greater than the sum of its parts. Unfortunately, the way many security products are engineered, ... Read More

13 Grounded and Realistic Cybersecurity Predictions for 2019 [Roundup]

“The AI security software has malicious intent.” That was Kelly Shortridge’s second prediction on a humorous list of 2019 predictions for cybersecurity published ... Read More
Open Source Security Tools and Threat Hunting: The 10 Most Read Bricata Posts on Cybersecurity in 2018

Open Source Security Tools and Threat Hunting: The 10 Most Read Bricata Posts on Cybersecurity in 2018

Every week we publish a blog post where we dive into a topic or study around network security. In 2018, we even produced ... Read More

15 Cybersecurity Statistics Summarizing the Intense Year the Community had in 2018

If there was a common denominator across the cybersecurity community in 2018, it was this: everything got more intense. The volume of attacks, ... Read More
Survey says netowrk security should focus on security analytics, data integration and behavioral analysis

Amid AI and Machine Learning, the Human Touch Remains Crucial to Cybersecurity in 2019, New Network Security Survey Finds

Amid the fervor over artificial intelligence (AI) and machine learning, it’s easy to lose sight of just how important human involvement is in ... Read More
Bricata - Network Threat Hunting Simplified

How Enhanced Network Metadata Resolution Facilitates Network Threat Hunting

| | Blog, Network Security, Threat Hunting
We recently announced a new version of our product – Bricata Delivers Improved Threat Hunting with Enhanced Network Metadata Resolution, Scalability, and View ... Read More

Bricata Named to the Inaugural NVTC Tech 100 by the Northern Virginia Tech Council

| | SBN News
Network Security Provider Recognized Among Technology Companies and Individuals NVTC Sees as Driving Growth in the Greater Washington Region December 6, 2018 – ... Read More
Profiling And Detecting All Things SSL With JA3 - John Althouse and Jeff Atkinson

Network Visibility: Can You Analyze Encrypted Traffic for Cybersecurity Threats?

We get this question a lot: Can you analyze encrypted traffic for cyber threats? It just came up again during the question and ... Read More
Here is How Open Source DIY Fatigue Saps Cybersecurity Resources

Here is How Open Source DIY Fatigue Saps Cybersecurity Resources

| | Blog, Bro IDS, ids, Snort IDS, Zeek IDS
Open source security tools often start as cost-saving DIY projects inside cybersecurity organizations, but as the network grows, these take more time to maintain and manage, which detracts from the task of actually protecting the network ... Read More

Secure Guardrails