I wanted to like this report, but … – Fortinet Global Threat Landscape Report 1H 2022

The Thursday edition of ‘Too Long; Did Read’ focuses on Fortinet’s Global Threat Landscape Report for the first half of 2022. In my experience, 7-8 weeks to go from data collection to ...

Don’t Count on Cybersecurity Data

It is a common theme of mine, but one which bears repeating. We collect and disseminate all manner of data, but not so much of data which count. In an article by ...

Open Source Security Software: Takeaways from a Case Study on DIY Fatigue

Open source security software can cause teams to spend more time maintaining a tool than securing their network – this case study describes how Bricata solves that challenge ...
Detection & Response: Building Effective SOC Operations

6 Tips for Building an Effective SOC

| | Blog, ids, Incident Response, IPS, SOC
A presentation from RSA Unplugged 2019 offers several tips to security leaders seeking to build or improve their security operations center (SOC) ...

7 Threat Hunting Benchmarks from a Survey of Security Pros

| | Blog, ids, IPS, SOC, threat detection, Threat Hunting
Threat hunting aims to find threats that didn’t trigger an alert, yet it’s still a new concept for many, so these threat hunting benchmarks are useful waypoints ...

Vulnerability Management and Patch Management Are Not the Same

Vulnerability management and patch management are not products. They are processes, and the products are tools used to enable the process. You cannot buy a hammer, nails and wood and expect them ...
Open Source Security Tools and Threat Hunting: The 10 Most Read Bricata Posts on Cybersecurity in 2018

Open Source Security Tools and Threat Hunting: The 10 Most Read Bricata Posts on Cybersecurity in 2018

Every week we publish a blog post where we dive into a topic or study around network security. In 2018, we even produced ...
Consumer IoT Security v1.01

Consumer IoT Security v1.01

They say charity begins at home, well IoT security probably should too. The growing number of Internet enabled and connected devices we populate our homes with continues to grow year on year ...
Machine Learning Approaches to Anomaly and Behavioral Threat Detection

Machine Learning Approaches to Anomaly and Behavioral Threat Detection

Anomaly detection approaches to threat detection have traditionally struggled to make good on the efficacy claims of vendors once deployed in real environments. Rarely have the vendors lied about their products capability ...