ZeekWeek 2019: 5 Things Network Security Pros Should Know about Zeek

As the annual ZeekWeek conference kicks off – here are X things network security professionals should know about Zeek ...

The Benefits, Characteristics and Components of Flyaway Kits for Incident Response

Several different measures of effectiveness tell us incident response (IR) generally takes too long and costs too much. For example, a global study ...
Bro Befriends Suricata by Michal Purzynski

What is Suricata? Intro to a Best of Breed Open Source IDS and IPS

“ESG research indicates network security monitoring is most often the center of gravity for threat detection. In other words, SOC analysts detect suspicious ...
AI Network Security FI

Network Security Challenges Create a Commercial Imperative for AI

It won’t come as a surprise when I say that digital security has changed over the past few years. Remember when digital security used to be all about signature-based detection? It doesn’t ...
public cloud Lastline Defender FI

The Cloud Can be a Dangerous Place. Are Your Public Cloud Workloads Safe?

Enterprises have changed the way they interact with data and where their workloads reside. Approximately a decade ago, enterprises directly owned and housed servers that IT personnel maintained. These servers sat in ...
Is NTA Another Kind of IDS

Is NTA Just Another Kind of IDS?

Earlier last year, Anton Chuvakin of Gartner posted a question I’ve spent the past few years focused on. Actually, I’ve focused on it since working in the Network Security Wizards office on ...
Security Boulevard
Network Traffic Analysis Security Goals

How Network Traffic Analysis Can Help in Meeting Security Goals

Network traffic analysis is a fast-rising class of security tools that promises actionable insights from an under-appreciated but integral part of your existing IT infrastructure: your network. Analysts and industry thought leaders ...
Security Boulevard