ids

How Better Network Instrumentation Eliminates Security Risks – Q&A with Chief Product Officer Andre Ludwig

Today we’re discussing network instrumentation with Bricata Chief Product Officer Andre Ludwig. Our interview covers why instrumentation is needed, the…

4 weeks ago

Sniffing Decrypted TLS Traffic with Security Onion

Wouldn't it be awesome to have a NIDS like Snort, Suricata or Zeek inspect HTTP requests leaving your network inside…

11 months ago

Open Source Security Software: Takeaways from a Case Study on DIY Fatigue

Open source security software can cause teams to spend more time maintaining a tool than securing their network – this…

1 year ago

ZeekWeek 2019: 5 Things Network Security Pros Should Know about Zeek

As the annual ZeekWeek conference kicks off – here are X things network security professionals should know about Zeek.

1 year ago

6 Tips for Building an Effective SOC

A presentation from RSA Unplugged 2019 offers several tips to security leaders seeking to build or improve their security operations…

1 year ago

7 Threat Hunting Benchmarks from a Survey of Security Pros

Threat hunting aims to find threats that didn’t trigger an alert, yet it’s still a new concept for many, so…

1 year ago

The Benefits, Characteristics and Components of Flyaway Kits for Incident Response

Several different measures of effectiveness tell us incident response (IR) generally takes too long and costs too much. For example,…

1 year ago

One Environment – Three Objectives Satisfied

Whether a security analyst is aiming for better network visibility, investigating a security alert or threat hunting, the right environment…

1 year ago

PolarProxy Released

I'm very proud to announce the release of PolarProxy today! PolarProxy is a transparent TLS proxy that decrypts and re-encrypts…

1 year ago

Is NTA Just Another Kind of IDS?

Earlier last year, Anton Chuvakin of Gartner posted a question I’ve spent the past few years focused on. Actually, I’ve…

2 years ago