Bricata
Follow
8 Followers
Follow Bricata on their other social channels!
About Us
Founded:
2014
Company Size:
11-50 employees
Company Type:
Private
Location:
Columbia, MD / USA
Website:
Bricata is a cybersecurity solutions provider that combines a powerful network threat hunting platform into a comprehensive threat detection and prevention solution to help determine the true scope and severity threats. Bricata simplifies network threat hunting by identifying hidden threats using sp ...
Read more
Promoted Content
Whitepaper: Natural Network Threat Hunting Emerging as One Key to Modern Cybersecurity
Follow
13
FOUR-TIME CEO SAYS CORPORATE CULTURE IS THE MOST IMPORTANT DEFENSE IN CYBERSECURITY
by BricataThat culture eats strategy for lunch is an idea often attributed to the late management guru, Peter Drucker. Mr. Drucker may have never imagined the world of cybersecurity we have today, but the power of good ideas is that they hold up over time.To that end, culture may be the most important factor any CEO has within reach to secure their organization, according to Ben Levitan. Over the course of his career, Mr. Levitan has held the CEO title four different times and influenc ...
Follow
14
7 KEY CYBERSECURITY FACTORS SHAPING THREAT HUNTING TECHNOLOGIES
by BricataThe cyber community has more tools and techniques than any time in history, and yet cyber-attacks are still successful.That’s according to a new Bricata white paper we just published called Natural Network Threat Hunting Emerging as One Key to Modern Cybersecurity. It’s not just that these attacks are succeeding, it’s that they are happening “in increasingly large numbers.”According to the paper:“The latest Verizon Breach Investigations Report hit another high&nbs ...
Follow
15
HERE’S WHAT NETWORK THREAT HUNTING MEANS, WHY IT MATTERS, AND HOW TO GET STARTED
by BricataWhat is network threat hunting? Threat hunting is looking for indications of malicious activities that aren’t being detected by static detection.That’s according to Tim Crothers who is perhaps, from our perspective, among the most prominent experts on the concept of threat hunting. He’s been in security for a long time, has built and led large security teams, penned books on the topic, and routinely makes the rounds on the speaking circuit.On a recent webinar titled&nbs ...
Follow
21
THE MULTI-MILLION DOLLAR QUESTION: WHO OWNS CLOUD SECURITY?
by BricataSecurity is paramount in the enterprise…or is it?In the last year or so, a number of enterprises have recently put new tech projects, including security, on hold, except for the cloud. The pressure from the business to migrate to the cloud has become so intense, all other projects have been halted.In some of these shops, the plan is to stop everything else they are doing long enough to set the cloud in motion, and then come back to revisit security. This is the sort of stuff tha ...
Follow
33
CYBER THREAT INTEL MEANS LITTLE IF YOU DON’T HAVE THE TOOLS TO ACT
by Ben LevitanIn mid-March 2018, federal law enforcement warned of a multi-stage attack on U.S. energy sector grids. The analysis triggered a Joint Technical Alert (JTA) by the U.S. Computer Emergency Response Team (US-CERT).The CyberWire summarized the incident this way in the introduction to its March 19th daily briefing:“The Department of Homeland Security has warned that Russian operators successfully intruded into electrical grid industrial control systems, albeit ...
Follow
42
WHAT IS BRO? AND WHY IDS DOESN’T EFFECTIVELY DESCRIBE IT [OVERVIEW AND RESOURCES]
by BricataWhat is Bro? Bro is an open source software framework for analyzing network traffic that is most commonly used to detect behavioral anomalies on a network for cybersecurity purposes.Bro provides capabilities that are similar to network intrusion detection systems (IDS), however, thinking about Bro exclusively as an IDS doesn’t effectively describe the breadth of its capabilities. This is because Bro enables security operations centers (SOC) to do much more – including performing in ...
Follow
366
THREAT EVOLUTION AND THE ECONOMICS OF CYBERSECURITY [Q&A WITH JOHN PIRC, AUTHOR AND SECURITY EXPERT]
Note: John Pirc’s thoughts and comments are his own and are not representative of Secureworks.The refrigerator was internet-enabled, a recent evolution of the internet of things (IoT). Unfortunately, the product was rushed to market and security was merely an afterthought. That’s how a refrigerator winds up as the weakest link in enterprise network security.The malware got in through that device the night before and spread to other devices in the home, including the home offic ...
Follow
63
NEW VULNERABILITY? BEGIN CHANGE MANAGEMENT TO PATCH AND START MONITORING FOR EXPLOITS
Every new cybersecurity vulnerability that’s announced sets off a race as organizations strive to patch it before someone with malicious aspirations finds a way to exploit the hole.That was one of the underlying issues observed in the aftermath of the Equifax breach. Big organizations with complex IT infrastructure prefer to test new vulnerability patches before implementing these to a live environment. This change management process helps ensure new software patches don’t cause an ...
Follow
63
WHAT IS FILE CARVING AND HOW DOES IT ENHANCE NETWORK SECURITY?
File carving is a technique that’s been around a while and traditionally has uses in data recovery and forensics. The origin traces back to the idea that nothing deleted on a computer is truly gone, until or unless that memory has been written over or wiped.Conventional definitions of file carving often refer to this as memory reallocation. What this means is even if you delete a file on your computer, file carving can be used to reconstruct that file, until that memory is reallocate ...
Follow
169
HEALTHCARE SECURITY EXPERT: THE TOP CYBERTHREAT IN HEALTHCARE IS FINANCE
If you asked someone with 20 years of healthcare security to name the top challenges facing the industry today, what do you think they’d say?Would they cite the latest vulnerability? Lament the lack of user education? Decry the portfolio of complicated tools firing noising alerts?Perhaps, but there’s one challenge that’s common to all of these and it’s financial. That’s according to Steve Swansbrough, who has 22 years in the field and most recently focused on protec ...

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel