Bricata
Follow
7 Followers
Follow Bricata on their other social channels!
About Us
Founded:
2014
Company Size:
11-50 employees
Company Type:
Private
Location:
Columbia, MD / USA
Website:
Bricata is a cybersecurity solutions provider that combines a powerful network threat hunting platform into a comprehensive IDPS solution to help determine the true scope and severity threats. Bricata simplifies network threat hunting by identifying Hidden threats using specifically designed hunting ...
Read more
Promoted Content
Whitepaper: Natural Network Threat Hunting Emerging as One Key to Modern Cybersecurity
Follow
9
CYBER THREAT INTEL MEANS LITTLE IF YOU DON’T HAVE THE TOOLS TO ACT
by Ben LevitanIn mid-March 2018, federal law enforcement warned of a multi-stage attack on U.S. energy sector grids. The analysis triggered a Joint Technical Alert (JTA) by the U.S. Computer Emergency Response Team (US-CERT).The CyberWire summarized the incident this way in the introduction to its March 19th daily briefing:“The Department of Homeland Security has warned that Russian operators successfully intruded into electrical grid industrial control systems, albeit ...
Follow
14
WHAT IS BRO? AND WHY IDS DOESN’T EFFECTIVELY DESCRIBE IT [OVERVIEW AND RESOURCES]
by BricataWhat is Bro? Bro is an open source software framework for analyzing network traffic that is most commonly used to detect behavioral anomalies on a network for cybersecurity purposes.Bro provides capabilities that are similar to network intrusion detection systems (IDS), however, thinking about Bro exclusively as an IDS doesn’t effectively describe the breadth of its capabilities. This is because Bro enables security operations centers (SOC) to do much more – including performing in ...
Follow
338
THREAT EVOLUTION AND THE ECONOMICS OF CYBERSECURITY [Q&A WITH JOHN PIRC, AUTHOR AND SECURITY EXPERT]
Note: John Pirc’s thoughts and comments are his own and are not representative of Secureworks.The refrigerator was internet-enabled, a recent evolution of the internet of things (IoT). Unfortunately, the product was rushed to market and security was merely an afterthought. That’s how a refrigerator winds up as the weakest link in enterprise network security.The malware got in through that device the night before and spread to other devices in the home, including the home offic ...
Follow
36
NEW VULNERABILITY? BEGIN CHANGE MANAGEMENT TO PATCH AND START MONITORING FOR EXPLOITS
Every new cybersecurity vulnerability that’s announced sets off a race as organizations strive to patch it before someone with malicious aspirations finds a way to exploit the hole.That was one of the underlying issues observed in the aftermath of the Equifax breach. Big organizations with complex IT infrastructure prefer to test new vulnerability patches before implementing these to a live environment. This change management process helps ensure new software patches don’t cause an ...
Follow
40
WHAT IS FILE CARVING AND HOW DOES IT ENHANCE NETWORK SECURITY?
File carving is a technique that’s been around a while and traditionally has uses in data recovery and forensics. The origin traces back to the idea that nothing deleted on a computer is truly gone, until or unless that memory has been written over or wiped.Conventional definitions of file carving often refer to this as memory reallocation. What this means is even if you delete a file on your computer, file carving can be used to reconstruct that file, until that memory is reallocate ...
Follow
142
HEALTHCARE SECURITY EXPERT: THE TOP CYBERTHREAT IN HEALTHCARE IS FINANCE
If you asked someone with 20 years of healthcare security to name the top challenges facing the industry today, what do you think they’d say?Would they cite the latest vulnerability? Lament the lack of user education? Decry the portfolio of complicated tools firing noising alerts?Perhaps, but there’s one challenge that’s common to all of these and it’s financial. That’s according to Steve Swansbrough, who has 22 years in the field and most recently focused on protec ...
Follow
49
LAYERS OF CYBERSECURITY: SIGNATURE DETECTION VS. NETWORK BEHAVIORAL ANALYSIS
Signature-based detection techniques have been used since the earliest days of security monitoring. Virus scanners used signatures to identify infected files, and the earliest intrusion detection systems(IDS) relied heavily upon signatures definitions.In previous years, these provide adequate protection until adversaries became more advanced. Bad actors discovered methods of evading signatures, leaving the first-generation of signature-based detection systems ill-equipped to ...
Follow
64
THREAT HUNTING IS AN IMPERATIVE DESPITE CHALLENGES IN DEFINITIONS, DATA AND SKILLS
by Ben LevitanIf you asked 10 people for a definition of “threat hunting” you’d get 10 different definitions.For some, the term threat hunting is old wine in new bottle. For others, it’s a luxury amid the fast pace of a security operations (SecOps) organization. For still others, it’s unpacking payloads and sifting through the data, later, when you have time.But you never have time later in cybersecurity, and so threat hunting is none of these things. Yet it remains an essent ...
Follow
237
EMERGING HEALTHCARE SECURITY CHALLENGES
Healthcare institutions are attractive cyber targets not just because of the potentially lucrative data they maintained, but also because of the inherent infrastructure risks and privacy constraints.The technology infrastructure supporting the healthcare community tends to be older legacy systems. For example, market research suggests 20% of healthcare organizations in the US and UK still run on Windows XP. Often these systems do not receive security updates with the same level of care ...
Follow
74
STUDY ON FILELESS ATTACKS UNDERSCORES RISK OF OVER-RELIANCE ON ENDPOINT SECURITY
The fileless attack is a prime example of security threat evolution and the ability of adversaries to identify new and vulnerable paths of attack.Rather than using downloadable files, such as malicious executables, fileless attacks use exploits, macros, scripts, or legitimate system tools, instead,” according to a new study by the Poneman Institute, titled, The 2017 State of Endpoint Security Risk.Such attacks are designed to be launched from system memory, never touching the lo ...

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel