Make it Harder to Hide: 3 Techniques for Conducting Threat Hunting at Scale

The law of large numbers theorem facilitates threat hunting at scale on large networks because it isolates unusual activity and network anomalies.
The post Make it Harder to Hide: 3 Techniques for Conducting Threat Hunting at Scale appeared first on Se… Continue reading Make it Harder to Hide: 3 Techniques for Conducting Threat Hunting at Scale

Open Source Security Tools and Threat Hunting: The 10 Most Read Bricata Posts on Cybersecurity in 2018

Every week we publish a blog post where we dive into a topic or study around network security. In 2018, we even produced…
The post Open Source Security Tools and Threat Hunting: The 10 Most Read Bricata Posts on Cybersecurity in 2018 appeared first o… Continue reading Open Source Security Tools and Threat Hunting: The 10 Most Read Bricata Posts on Cybersecurity in 2018