Now You Know – Q&A about Bricata with CEO John Trauth

Bricata CEO John Trauth discusses how Bricata is helping the world’s largest organizations secure their networks by delivering the most complete network detection and response (NDR) capabilities available. 1) What was your ...

No data? No hunt. Top tips to ensure a successful threat hunting environment

Threat hunting continues to be a priority for security teams. Many organizations have plans to initiate or expand threat hunting programs. All successful ...

No data? No hunt. Top tips to ensure a successful threat hunting environment

Threat hunting continues to be a priority for security teams. Many organizations have plans to initiate or expand threat hunting programs. All successful threat hunting begins with having the right data to ...

Cybersecurity in the Summer of Uncertainty

What is the new normal for security professionals in the Summer of 2020? Hint: It involves protecting a larger attack surface than anyone ever imagined. Remote Workers Everywhere More employees than ever ...

Signs You Might Be Ready for an IDS Upgrade

When was the last time you assessed your Intrusion Detection System (IDS)? These solutions remain vitally important today, but as threats and the ...

Signs You Might Be Ready for an IDS Upgrade

When was the last time you assessed your Intrusion Detection System (IDS)? These solutions remain vitally important today, but as threats and the threat landscape continue to evolve, so does IDS. In ...

Four Key Elements for Comprehensive Network Threat Detection

Today’s cybersecurity landscape is a mix of old and new threats. Many of the attacks that organizations encounter involve legacy malware and techniques ...

Four Key Elements for Comprehensive Network Threat Detection

Today’s cybersecurity landscape is a mix of old and new threats. Many of the attacks that organizations encounter involve legacy malware and techniques that are repackaged and reused (this post from security ...

Nine Network Security Topics Grabbing Headlines in Q1 2020

The security landscape is getting more complex as threats like IoT device attacks, fileless malware, and non-email phishing attacks continue to rise. The ...