intrusion detection

3 SOC Trends Shaping the Future of Security

It’s easy to suggest that the COVID-19 pandemic has had the greatest impact on any company’s security operations center (SOC)…

2 weeks ago

How Better Network Instrumentation Eliminates Security Risks – Q&A with Chief Product Officer Andre Ludwig

Today we’re discussing network instrumentation with Bricata Chief Product Officer Andre Ludwig. Our interview covers why instrumentation is needed, the…

4 weeks ago

The Problem with Traditional Threat Detection and Response

Let’s face it: The current, standard approach to threat detection and response just isn’t cutting it. But now, a choice…

2 months ago

File Integrity Monitoring (FIM): Your Friendly Network Detective Control

Lateral movement is one of the most consequential types of network activity for which organizations need to be on the…

2 months ago

Cybersecurity Maturity Model Certification (CMMC) In-Depth

In our first blog in this series, we introduced the new Cybersecurity Maturity Model Certification (CMMC) and described the five…

2 months ago

Achieve Complete Threat Detection & Response At Less Cost

Achieving comprehensive, effective, and efficient threat detection and response has been an ongoing struggle for most organizations. Until now, they…

3 months ago

What is the Cybersecurity Maturity Model Certification?

Just what is the Cybersecurity Maturity Model Certification (CMMC), and how can you make sure you can meet it? See…

4 months ago

Remote Security Operations Center Concerns | ARIACybersecurity

Say goodbye to the concept of “business as usual.” COVID-19 has changed virtually every normal process, including cybersecurity methods and…

5 months ago

9 Types of Cyber Attacks Organizations Must Prepare For

As an IT security professional, you must be hyper-aware of all the possible types of cyber attacks to your network…

6 months ago

A Look at the “New Normal” of Enterprise Cybersecurity

We invite you to attend our upcoming webinar with Sumo Logic to learn how you can achieve enterprise cybersecurity. Especially…

6 months ago