Today we’re discussing network instrumentation with Bricata Chief Product Officer Andre Ludwig. Our interview covers why instrumentation is needed, the…
Wouldn't it be awesome to have a NIDS like Snort, Suricata or Zeek inspect HTTP requests leaving your network inside…
Open source security software can cause teams to spend more time maintaining a tool than securing their network – this…
As the annual ZeekWeek conference kicks off – here are X things network security professionals should know about Zeek.
A presentation from RSA Unplugged 2019 offers several tips to security leaders seeking to build or improve their security operations…
Threat hunting aims to find threats that didn’t trigger an alert, yet it’s still a new concept for many, so…
Several different measures of effectiveness tell us incident response (IR) generally takes too long and costs too much. For example,…
Whether a security analyst is aiming for better network visibility, investigating a security alert or threat hunting, the right environment…
I'm very proud to announce the release of PolarProxy today! PolarProxy is a transparent TLS proxy that decrypts and re-encrypts…
Earlier last year, Anton Chuvakin of Gartner posted a question I’ve spent the past few years focused on. Actually, I’ve…