Is NTA Just Another Kind of IDS?

Earlier last year, Anton Chuvakin of Gartner posted a question I’ve spent the past few years focused on. Actually, I’ve focused on it since working in the Network Security Wizards office on the Dragon IDS back in Y2K, back when it was called Y2K. In t… Continue reading Is NTA Just Another Kind of IDS?

How to connect a Raspberry Pi IDS to the home router to detect intrusions network wide?

I’m configuring a raspberry pi IDS/IPS with ELK stack on a separate machine, my problem is to connecting it to the router in a way it can read traffic on the whole network and drop the suspicious packets.

The way I came up w… Continue reading How to connect a Raspberry Pi IDS to the home router to detect intrusions network wide?

Open Source Security Tools and Threat Hunting: The 10 Most Read Bricata Posts on Cybersecurity in 2018

Every week we publish a blog post where we dive into a topic or study around network security. In 2018, we even produced…
The post Open Source Security Tools and Threat Hunting: The 10 Most Read Bricata Posts on Cybersecurity in 2018 appeared first o… Continue reading Open Source Security Tools and Threat Hunting: The 10 Most Read Bricata Posts on Cybersecurity in 2018

Need help regarding Cyber Security project on Intrusion Analysis and File Integrity Monitoring [on hold]

I want help in making a project that is

Intrusion Analysis and File Integrity Monitoring

I don’t know where to begin or what to do as I am new in this cyber security field as I am a student.
At least someone give me so… Continue reading Need help regarding Cyber Security project on Intrusion Analysis and File Integrity Monitoring [on hold]

Need help regarding Cyber Security project on Intrusion Analysis and File Integrity Monitoring [on hold]

I want help in making a project that is

Intrusion Analysis and File Integrity Monitoring

I don’t know where to begin or what to do as I am new in this cyber security field as I am a student.
At least someone give me so… Continue reading Need help regarding Cyber Security project on Intrusion Analysis and File Integrity Monitoring [on hold]