The Benefits, Characteristics and Components of Flyaway Kits for Incident Response

Several different measures of effectiveness tell us incident response (IR) generally takes too long and costs too much. For example, a global study ...
Bro Befriends Suricata by Michal Purzynski

What is Suricata? Intro to a Best of Breed Open Source IDS and IPS

“ESG research indicates network security monitoring is most often the center of gravity for threat detection. In other words, SOC analysts detect suspicious ...
U.S. Army, Towson University Aim to Advance Intrusion Detection

U.S. Army, Towson University Aim to Advance Intrusion Detection

Researchers at the Army Research Lab (ARL) within the U.S. Army Combat Capabilities Development Command and Towson University are collaborating on an effort to make intrusion detection alerts more useful to cybersecurity ...
Security Boulevard
Open Source Security Tools and Threat Hunting: The 10 Most Read Bricata Posts on Cybersecurity in 2018

Open Source Security Tools and Threat Hunting: The 10 Most Read Bricata Posts on Cybersecurity in 2018

Every week we publish a blog post where we dive into a topic or study around network security. In 2018, we even produced ...
EH-Net - Kendall - Hacking Retro

Hacking Retro

Bring out your disco ball, your leg warmers, and your VHS tapes! While a lot of us watch the VH1 hit “I Love the 80s” for pop culture, I’m always drawn to ...