Bricata
Follow
15 Followers
Follow Bricata on their other social channels!
About Us
Founded:
2014
Company Size:
11-50 employees
Company Type:
Private
Location:
Columbia, MD / USA
Website:
Bricata is a cybersecurity solutions provider that combines a powerful network threat hunting platform into a comprehensive threat detection and prevention solution to help determine the true scope and severity threats. Bricata simplifies network threat hunting by identifying hidden threats using sp ...
Read more
Promoted Content
Whitepaper: Natural Network Threat Hunting Emerging as One Key to Modern Cybersecurity
Follow
693
How Bro IDS can Help Security Capture Institutional Knowledge for Cyber Alert Enrichment and Better Network Traffic Analysis [#BroCon Session]
by BricataThe network security analyst has a vexing challenge: a prerequisite for identifying abnormal or suspicious behavior is an understanding of what normal looks like. This means identifying each device on sprawling networks – and knowing its purpose.That knowledge provides analysts with a better sense for which machines should talk to each other, over what protocols, and what characteristics or attributes are typically associated with such connections. With that level of understanding th ...
Follow
14
Threat Hunting is Growing Up in the SOC, Study Finds
by BricataSome 40% of cybersecurity organizations say they conduct threat hunting today, according to the 2018 Threat Hunting Report by Cybersecurity Insiders. While that’s just a 5% bump over the same survey conducted last year, the survey also found six out of every 10 respondents say their organizations have plans to build out threat hunting programs over the next three years.While the concept of threat hunting is still relatively new, the survey this year suggests ...
Follow
27
Cybersecurity Executive Bob Gourley on Trends, Due Diligence, and the Software Defined Perimeter
by BricataWhen it comes to sharing knowledge about cybersecurity, Bob Gourley may well rank among the most prolific. His publication, the Threat Brief, is a must-read daily and he also publishes CTOvison.com, helps with OODA Loop, and is fairly active on the LinkedIn platform called Pulse.He’s got a lot to offer too.After serving as a Naval intelligence officer for 20 years, he went on to work in a variety of related roles in government and corporations alike. Tod ...
Follow
146
FOUR-TIME CEO SAYS CORPORATE CULTURE IS THE MOST IMPORTANT DEFENSE IN CYBERSECURITY
by BricataThat culture eats strategy for lunch is an idea often attributed to the late management guru, Peter Drucker. Mr. Drucker may have never imagined the world of cybersecurity we have today, but the power of good ideas is that they hold up over time.To that end, culture may be the most important factor any CEO has within reach to secure their organization, according to Ben Levitan. Over the course of his career, Mr. Levitan has held the CEO title four different times and influenc ...
Follow
43
7 KEY CYBERSECURITY FACTORS SHAPING THREAT HUNTING TECHNOLOGIES
by BricataThe cyber community has more tools and techniques than any time in history, and yet cyber-attacks are still successful.That’s according to a new Bricata white paper we just published called Natural Network Threat Hunting Emerging as One Key to Modern Cybersecurity. It’s not just that these attacks are succeeding, it’s that they are happening “in increasingly large numbers.”According to the paper:“The latest Verizon Breach Investigations Report hit another high&nbs ...
Follow
45
HERE’S WHAT NETWORK THREAT HUNTING MEANS, WHY IT MATTERS, AND HOW TO GET STARTED
by BricataWhat is network threat hunting? Threat hunting is looking for indications of malicious activities that aren’t being detected by static detection.That’s according to Tim Crothers who is perhaps, from our perspective, among the most prominent experts on the concept of threat hunting. He’s been in security for a long time, has built and led large security teams, penned books on the topic, and routinely makes the rounds on the speaking circuit.On a recent webinar titled&nbs ...
Follow
61
THE MULTI-MILLION DOLLAR QUESTION: WHO OWNS CLOUD SECURITY?
by BricataSecurity is paramount in the enterprise…or is it?In the last year or so, a number of enterprises have recently put new tech projects, including security, on hold, except for the cloud. The pressure from the business to migrate to the cloud has become so intense, all other projects have been halted.In some of these shops, the plan is to stop everything else they are doing long enough to set the cloud in motion, and then come back to revisit security. This is the sort of stuff tha ...
Follow
53
CYBER THREAT INTEL MEANS LITTLE IF YOU DON’T HAVE THE TOOLS TO ACT
by Ben LevitanIn mid-March 2018, federal law enforcement warned of a multi-stage attack on U.S. energy sector grids. The analysis triggered a Joint Technical Alert (JTA) by the U.S. Computer Emergency Response Team (US-CERT).The CyberWire summarized the incident this way in the introduction to its March 19th daily briefing:“The Department of Homeland Security has warned that Russian operators successfully intruded into electrical grid industrial control systems, albeit ...
Follow
89
WHAT IS BRO? AND WHY IDS DOESN’T EFFECTIVELY DESCRIBE IT [OVERVIEW AND RESOURCES]
by BricataWhat is Bro? Bro is an open source software framework for analyzing network traffic that is most commonly used to detect behavioral anomalies on a network for cybersecurity purposes.Bro provides capabilities that are similar to network intrusion detection systems (IDS), however, thinking about Bro exclusively as an IDS doesn’t effectively describe the breadth of its capabilities. This is because Bro enables security operations centers (SOC) to do much more – including performing in ...
Follow
393
THREAT EVOLUTION AND THE ECONOMICS OF CYBERSECURITY [Q&A WITH JOHN PIRC, AUTHOR AND SECURITY EXPERT]
Note: John Pirc’s thoughts and comments are his own and are not representative of Secureworks.The refrigerator was internet-enabled, a recent evolution of the internet of things (IoT). Unfortunately, the product was rushed to market and security was merely an afterthought. That’s how a refrigerator winds up as the weakest link in enterprise network security.The malware got in through that device the night before and spread to other devices in the home, including the home offic ...

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel