network metadata
Experience Bricata Network Detection and Response in Minutes
Bricata Labs is a quick and easy way for security analysts and threat hunters to experience the full power of the Bricata network detection and response solution. In less than five minutes, ...
Suricata or Zeek? The answer is both.
If you apply Pereto’s Principal (the 80/20 rule) to network security, about 80% of incidents are caused by known threats that are easily ...
Suricata or Zeek? The answer is both.
If you apply Pereto’s Principal (the 80/20 rule) to network security, about 80% of incidents are caused by known threats that are easily identified by signature-based rules system and 20% come from ...
3 Cool New Network Security Features in the Bricata Platform you Might have Missed
Bricata recently released a new version of its network security product with several cool new features including metadata filters, customizable dashboards and smart alert grouping ...
One Environment – Three Objectives Satisfied
Whether a security analyst is aiming for better network visibility, investigating a security alert or threat hunting, the right environment makes all the difference ...
The Important Distinction between Threat Hunting and “True” Threat Hunting
With all the market buzz surrounding threat hunting, many network security technologies are now touting themselves as threat hunting solutions. But, beware, rather than delivering a complete solution for threat hunting, most ...

A Shift in Mindset: 7 Practical Ideas Every CISO Should Know About Threat Hunting
As CISOs and security leaders build out enterprise threat hunting programs, we put together a list of practical ideas we’ve seen around the concept ...

The Top 10 Network Security Challenges in 2019
Most security professionals say network security is harder this year when compared to last year – according to a survey we recently conducted ...