Bricata
Follow
26 Followers
Follow Bricata on their other social channels!
About Us
Founded:
2014
Company Size:
11-50 employees
Company Type:
Private
Location:
Columbia, MD / USA
Website:
Bricata is a cybersecurity solutions provider that combines a powerful network threat hunting platform into a comprehensive threat detection and prevention solution to help determine the true scope and severity threats. Bricata simplifies network threat hunting by identifying hidden threats using sp ...
Read more
Promoted Content
Whitepaper: Natural Network Threat Hunting Emerging as One Key to Modern Cybersecurity
Follow
Network Visibility: Can You Analyze Encrypted Traffic for Cybersecurity Threats?
We get this question a lot: Can you analyze encrypted traffic for cyber threats?It just came up again during the question and answer section of our most recent webinar about threat hunting, so we thought it would be useful to answer it here.The short answer is yes, you can analyze encrypted network traffic, though there are caveats. For example, you cannot read the contents of encrypted traffic that uses the Secure Sockets Layer or Transport Layer Security (SSL/TLS) protocols, whi ...
Follow
21
Here is How Open Source DIY Fatigue Saps Cybersecurity Resources
by BricataThe build vs. buy debate is a longstanding point of evaluation in open source cybersecurity tools. Recently, we’ve seen the do-it-yourself (DIY) theme reemerge among time-pressed security professionals because they wind up working to keep their open source creations up-to-date – rather than securing the enterprise.This tends to happen in organizations trying to save money. Often it starts by tasking someone with technical skills, but not necessarily cybersecurity skills, with defen ...
Follow
57
The Mixed Forecast for Cybersecurity during Black Friday and Cyber Monday
by BricataThe first nine months of 2018 have not been easy in cybersecurity circles. Reporting indicates that while breaches and records exposed are down slightly, the statistics are still staggering: 3,676 breaches and 3.6 billion compromised records, according to Dark Reading.What does that mean for the online holiday shopping period about to begin? We canvased security-focused corners the web to look for forecasts and narrowed a long list of citations down to five reliable sources.Y ...
Follow
704
The Bro Project Renames Bro IDS to Zeek IDS
by BricataOne of the most powerful cybersecurity tools you have never heard of just got a new name.The team leading The Bro Project has renamed the project to Zeek. The name change was announced to the open source community attending its annual conference, BroCon 2018, that wrapped up in mid-October.For about 20 years, the project has championed the Bro IDS framework, which is a very powerful network monitoring tool that can capture hundreds of metadata fields about ...
Follow
229
The 10 Tenets of CISO Success Frank Kim Presented at RSA
by BricataThere are three ways to obtain wisdom.Imitation – the easiest way;Reflection – the noblest way; andExperience, which is often the bitterest way.That’s how Frank Kim of ThinkSec opened his presentation – 10 Tenets of CISO Success – at the RSA Conference 2018 in San Francisco. Mr. Kim is a former CISO for the SANS Institute and built a security program for the healthcare company Kaiser Permanente.His presentation was fast-moving and ...
Follow
773
How Bro IDS can Help Security Capture Institutional Knowledge for Cyber Alert Enrichment and Better Network Traffic Analysis [#BroCon Session]
by BricataThe network security analyst has a vexing challenge: a prerequisite for identifying abnormal or suspicious behavior is an understanding of what normal looks like. This means identifying each device on sprawling networks – and knowing its purpose.That knowledge provides analysts with a better sense for which machines should talk to each other, over what protocols, and what characteristics or attributes are typically associated with such connections. With that level of understanding th ...
Follow
39
Threat Hunting is Growing Up in the SOC, Study Finds
by BricataSome 40% of cybersecurity organizations say they conduct threat hunting today, according to the 2018 Threat Hunting Report by Cybersecurity Insiders. While that’s just a 5% bump over the same survey conducted last year, the survey also found six out of every 10 respondents say their organizations have plans to build out threat hunting programs over the next three years.While the concept of threat hunting is still relatively new, the survey this year suggests ...
Follow
56
Cybersecurity Executive Bob Gourley on Trends, Due Diligence, and the Software Defined Perimeter
by BricataWhen it comes to sharing knowledge about cybersecurity, Bob Gourley may well rank among the most prolific. His publication, the Threat Brief, is a must-read daily and he also publishes CTOvison.com, helps with OODA Loop, and is fairly active on the LinkedIn platform called Pulse.He’s got a lot to offer too.After serving as a Naval intelligence officer for 20 years, he went on to work in a variety of related roles in government and corporations alike. Tod ...
Follow
178
FOUR-TIME CEO SAYS CORPORATE CULTURE IS THE MOST IMPORTANT DEFENSE IN CYBERSECURITY
by BricataThat culture eats strategy for lunch is an idea often attributed to the late management guru, Peter Drucker. Mr. Drucker may have never imagined the world of cybersecurity we have today, but the power of good ideas is that they hold up over time.To that end, culture may be the most important factor any CEO has within reach to secure their organization, according to Ben Levitan. Over the course of his career, Mr. Levitan has held the CEO title four different times and influenc ...
Follow
62
7 KEY CYBERSECURITY FACTORS SHAPING THREAT HUNTING TECHNOLOGIES
by BricataThe cyber community has more tools and techniques than any time in history, and yet cyber-attacks are still successful.That’s according to a new Bricata white paper we just published called Natural Network Threat Hunting Emerging as One Key to Modern Cybersecurity. It’s not just that these attacks are succeeding, it’s that they are happening “in increasingly large numbers.”According to the paper:“The latest Verizon Breach Investigations Report hit another high&nbs ...

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel