Suricata or Zeek? The answer is both.

If you apply Pereto’s Principal (the 80/20 rule) to network security, about 80% of incidents are caused by known threats that are easily ...

Suricata or Zeek? The answer is both.

If you apply Pereto’s Principal (the 80/20 rule) to network security, about 80% of incidents are caused by known threats that are easily identified by signature-based rules system and 20% come from ...

Four Key Elements for Comprehensive Network Threat Detection

Today’s cybersecurity landscape is a mix of old and new threats. Many of the attacks that organizations encounter involve legacy malware and techniques ...

Four Key Elements for Comprehensive Network Threat Detection

Today’s cybersecurity landscape is a mix of old and new threats. Many of the attacks that organizations encounter involve legacy malware and techniques that are repackaged and reused (this post from security ...

Getting Network Visibility into East-West Traffic

Getting highly granular “everywhere” visibility continues to be a significant challenge for organizations as they work to protect their networks from threats. Traditionally, ...

Getting Network Visibility into East-West Traffic

Getting highly granular “everywhere” visibility continues to be a significant challenge for organizations as they work to protect their networks from threats. Traditionally, companies have prioritized monitoring and securing north-south traffic (traffic ...

ZeekWeek 2019: 5 Things Network Security Pros Should Know about Zeek

As the annual ZeekWeek conference kicks off – here are X things network security professionals should know about Zeek ...
Threat Hunting Using 16th-Century Math and Sesame Street

Make it Harder to Hide: 3 Techniques for Conducting Threat Hunting at Scale

The law of large numbers theorem facilitates threat hunting at scale on large networks because it isolates unusual activity and network anomalies ...
Open Source Security Tools and Threat Hunting: The 10 Most Read Bricata Posts on Cybersecurity in 2018

Open Source Security Tools and Threat Hunting: The 10 Most Read Bricata Posts on Cybersecurity in 2018

Every week we publish a blog post where we dive into a topic or study around network security. In 2018, we even produced ...
Profiling And Detecting All Things SSL With JA3 - John Althouse and Jeff Atkinson

Network Visibility: Can You Analyze Encrypted Traffic for Cybersecurity Threats?

We get this question a lot: Can you analyze encrypted traffic for cyber threats? It just came up again during the question and ...