network metadata
Suricata or Zeek? The answer is both.
If you apply Pereto’s Principal (the 80/20 rule) to network security, about 80% of incidents are caused by known threats that are easily ...
Suricata or Zeek? The answer is both.
If you apply Pereto’s Principal (the 80/20 rule) to network security, about 80% of incidents are caused by known threats that are easily identified by signature-based rules system and 20% come from ...
3 Cool New Network Security Features in the Bricata Platform you Might have Missed
Bricata recently released a new version of its network security product with several cool new features including metadata filters, customizable dashboards and smart alert grouping ...
One Environment – Three Objectives Satisfied
Whether a security analyst is aiming for better network visibility, investigating a security alert or threat hunting, the right environment makes all the difference ...
The Important Distinction between Threat Hunting and “True” Threat Hunting
With all the market buzz surrounding threat hunting, many network security technologies are now touting themselves as threat hunting solutions. But, beware, rather than delivering a complete solution for threat hunting, most ...
A Shift in Mindset: 7 Practical Ideas Every CISO Should Know About Threat Hunting
As CISOs and security leaders build out enterprise threat hunting programs, we put together a list of practical ideas we’ve seen around the concept ...
The Top 10 Network Security Challenges in 2019
Most security professionals say network security is harder this year when compared to last year – according to a survey we recently conducted ...

