Bricata
Follow
32 Followers
Follow Bricata on their other social channels!
About Us
Founded:
2014
Company Size:
11-50 employees
Company Type:
Private
Location:
Columbia, MD / USA
Website:
Bricata is a cybersecurity solutions provider that combines a powerful network threat hunting platform into a comprehensive threat detection and prevention solution to help determine the true scope and severity threats. Bricata simplifies network threat hunting by identifying hidden threats using sp ...
Read more
Promoted Content
Whitepaper: Natural Network Threat Hunting Emerging as One Key to Modern Cybersecurity
Follow
24
The Six Flaws that Can Emerge in a Network Security Strategy
An enterprise network can give the sense it’s alive. It grows and evolves with time as new components are added. At the same time, these new components add complexity, increase risk and reduce visibility even as businesses are more reliant than ever on their networks.All this change can sometimes mean the original network security strategy isn’t a fit anymore and fundamental flaws will naturally emerge. So, what are the fundamental flaws that might make an existing network security strategy ...
Save
Like
08/08/2019
Follow
106
What do Cybersecurity Pros Earn in 2019? The Skim on 6 Salary Surveys
It’s not just finding cybersecurity talent amid “zero percent” unemployment that’s dogging employers – it’s retaining them too. Those were some of the findings in the State of Cybersecurity 2019 report by ISACA, which polled 1,576 security professionals. The high-level findings included the following:>> 69% said their teams are significantly (21%) or somewhat (48%) understaffed; >> 58% said their enterprises have unfilled cybersecurity roles; >> 32% said it tak ...
Save
Like
07/25/2019
Follow
110
How the Cloud is Changing the Role of the CISO
Experts have pointed out that the broad adoption of the cloud in business is changing the role of some IT professionals. For example, where system administrators used to manage on-prem servers to support business applications, many have parlayed those skills into cloud expertise. That’s happening in cybersecurity too, including at the leadership level, according to Michael Piacente, an executive recruiter at the boutique talent agency Hitch Partners. Mr. Piacente has a unique perspective becau ...
Save
Like
07/11/2019
Follow
82
8 Insights for Aligning Cybersecurity with the Culture of Healthcare
Healthcare systems and hospitals are in the business of saving lives. As such, their budgets prioritize staff, programs and equipment that are directly related to that goal. Consequently, cybersecurity tends to rank much further down on the long list of competing demands.Yet that may be beginning to change. Instead of using the fear of threats and adversaries to make the case to prioritize cybersecurity in healthcare, some creative problems solvers are nesting security goals with healthcare prio ...
Save
Like
06/27/2019
Follow
96
The 3 Triggers Indicating It’s Time to Reconsider Your Network Security Strategy
Metcalfe's Law said the value of a network grows as the square of the number of its “compatibly communicating devices” increase. Typically the presentations of Robert Metcalfe’s idea replaces “compatibly communicating devices” for “users” or “machines” according to Simeon Simeonov. Yet that’s an important nuance because while networks connect users, the proliferation of the IT infrastructure brings along other challenges. In his piece, Mr. Simeonov notes a large network “in ...
Save
Like
06/13/2019
Follow
120
5 Emerging Vectors of Attack and Recommendations for Mitigating the Risks
A lack of network visibility is a key challenge we hear about often from the network security community. It’s the result of a complicated mix of issues such as infrastructure complexity, BYOD, and the cloud transformation, among others.Compilations like these all ranked among the top 10 challenges in network security as identified by network security professionals we recently surveyed. These were also central elements in a panel session held at the RSA Conference titled, The Five Most Dangerou ...
Save
Like
05/20/2019
Follow
84
Considerations for Planning, Structuring and Deploying a New Network Security Strategy
by BricataNetworks tend to grow over time. Sometimes this growth is organic as the organization adds new devices and components. Other times this growth comes by way of acquisition, as an acquiring company also assumes ownership of the network infrastructure that formerly belonged to the business being acquired.Either way, the larger the organization, the harder it is to keep up with the addition of new network components. The more growth a network experiences, the less visibility the security t ...
Save
Like
04/29/2019
Follow
2598
62 Articles, Blog Posts and Links that Summarize the 2019 RSA Conference
by BricataThe annual RSA Conference in San Francisco wrapped last week and left us with a flood of articles, blogs and links about news and events stemming from the conference.If there was a theme that emerged in the digital records, we venture to say it was the human elementof cybersecurity. The fatigue and stress of security jobs, the shortage of cybersecurity talent, and women in cybersecurity were all key themes that seemed to underscore many of the stories that emerged.While ...
Save
Like
03/14/2019
Follow
121
How is the Relationship between DevOps and Cybersecurity?
by BricataThe trouble with making changes to a production environment is that change can have unintended consequences. A routine software or hardware upgrade might also have unintended or unforeseen effects that cause an outage.To address the problem, development and operations (DevOps) shepherd every proposed change through a well-defined change management process. This process takes time to complete and so when it comes to the urgency of patching a newly-discovered security vulnerability, it c ...
Save
Like
02/14/2019
Follow
302
The Growing Surface of Attack and What Cybercrime has in Common with Street Crime [Q&A with Steve Morgan of Cybersecurity Ventures]
by BricataTrillion with a “T.” Cybercrime damages will cost $6 trillion annually across the globe by 2021. That’s double the figure from 2015, which came in at about $3 trillion. It’s a number that’s calculated by an organization called Cybersecurity Ventures, a cybersecurity media property, founded by Steve Morgan.As astonishing as those numbers are, Mr. Morgan believes the estimates are misunderstood. This is because he draws a parallel between street crime and historical popula ...
Save
Like
01/29/2019

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel