Suricata: Open-source network analysis and threat detection

Suricata is an open-source network intrusion detection system (IDS), intrusion prevention system (IPS), and network security monitoring engine. Suricata features Suricata offers comprehensive capabilities for network security monitoring (NSM), includin… Continue reading Suricata: Open-source network analysis and threat detection

Zeek: Open-source network traffic analysis, security monitoring

Zeek is an open-source network analysis framework. Unlike an active security device such as a firewall, Zeek operates on a versatile ‘sensor’ that can be a hardware, software, virtual, or cloud platform. This flexibility allows Zeek to quie… Continue reading Zeek: Open-source network traffic analysis, security monitoring

Exploring the intersection of network security and modern technologies

Networks serve as the backbone of modern communication and business operations, facilitating seamless data exchange and connectivity. However, the increasing complexity of networks also brings forth heightened security challenges. Robust network securi… Continue reading Exploring the intersection of network security and modern technologies

Leveraging network automation to enhance network security

Data backups get a lot of attention, but sadly, sometimes, the operational work that keeps networks secure – like device backups, upgrades, and configuration grooming – goes undone. Recent high-profile network outages have brought attention to the impo… Continue reading Leveraging network automation to enhance network security

Nmap 7.93, the 25th anniversary edition, has been released

Nmap is a widely used free and open-source network scanner. It’s used for network inventorying, port scanning, managing service upgrade schedules, monitoring host or service uptime, etc. It works on most operating systems: Linux, Windows, macOS, … Continue reading Nmap 7.93, the 25th anniversary edition, has been released

Exploring the insecurity of readily available Wi-Fi networks

In this video for Help Net Security, Andy Thompson, Global Research Evangelist at CyberArk, talks about Wi-Fi security. He walks you through various protocols we see in the wild, and introduces specific hacking techniques to crack Wi-Fi passwords. Cybe… Continue reading Exploring the insecurity of readily available Wi-Fi networks

IoT Network Traffic Analysis: Opportunities and Challenges for Forensic Investigators

Hi, my name is Tina Wu. And today I’ll be presenting my presentation on IOT Network Traffic Analysis: Opportunities and Challenges for Forensic Investigators.

I’ll be giving you a brief introduction on the topic, what motivated us to car… Continue reading IoT Network Traffic Analysis: Opportunities and Challenges for Forensic Investigators

XDR: Next-Level Prevention and Detection

Security professionals are inundated with thousands of alerts per day generated by a growing number of cybersecurity tools. Investigating and connecting individual alerts to events often takes days. Seeing the proverbial forest for the trees is an ong… Continue reading XDR: Next-Level Prevention and Detection

XDR: Next-Level Prevention and Detection

Security professionals are inundated with thousands of alerts per day generated by a growing number of cybersecurity tools. Investigating and connecting individual alerts to events often takes days. Seeing the proverbial forest for the trees is an ong… Continue reading XDR: Next-Level Prevention and Detection

Now You Know – Q&A about Bricata with CEO John Trauth

Bricata CEO John Trauth discusses how Bricata is helping the world’s largest organizations secure their networks by delivering the most complete network detection and response (NDR) capabilities available. 1) What was your original vision for Bricata? … Continue reading Now You Know – Q&A about Bricata with CEO John Trauth