Bricata
Follow
32 Followers
Follow Bricata on their other social channels!
About Us
Founded:
2014
Company Size:
11-50 employees
Company Type:
Private
Location:
Columbia, MD / USA
Website:
Bricata is a cybersecurity solutions provider that combines a powerful network threat hunting platform into a comprehensive threat detection and prevention solution to help determine the true scope and severity threats. Bricata simplifies network threat hunting by identifying hidden threats using sp ...
Read more
Promoted Content
Whitepaper: Natural Network Threat Hunting Emerging as One Key to Modern Cybersecurity
Follow
30
5 Emerging Vectors of Attack and Recommendations for Mitigating the Risks
A lack of network visibility is a key challenge we hear about often from the network security community. It’s the result of a complicated mix of issues such as infrastructure complexity, BYOD, and the cloud transformation, among others.Compilations like these all ranked among the top 10 challenges in network security as identified by network security professionals we recently surveyed. These were also central elements in a panel session held at the RSA Conference titled, The Five Most Dangerou ...
Save
Like
05/20/2019
Follow
39
Considerations for Planning, Structuring and Deploying a New Network Security Strategy
by BricataNetworks tend to grow over time. Sometimes this growth is organic as the organization adds new devices and components. Other times this growth comes by way of acquisition, as an acquiring company also assumes ownership of the network infrastructure that formerly belonged to the business being acquired.Either way, the larger the organization, the harder it is to keep up with the addition of new network components. The more growth a network experiences, the less visibility the security t ...
Save
Like
04/29/2019
Follow
305
62 Articles, Blog Posts and Links that Summarize the 2019 RSA Conference
by BricataThe annual RSA Conference in San Francisco wrapped last week and left us with a flood of articles, blogs and links about news and events stemming from the conference.If there was a theme that emerged in the digital records, we venture to say it was the human elementof cybersecurity. The fatigue and stress of security jobs, the shortage of cybersecurity talent, and women in cybersecurity were all key themes that seemed to underscore many of the stories that emerged.While ...
Save
Like
03/14/2019
Follow
69
How is the Relationship between DevOps and Cybersecurity?
by BricataThe trouble with making changes to a production environment is that change can have unintended consequences. A routine software or hardware upgrade might also have unintended or unforeseen effects that cause an outage.To address the problem, development and operations (DevOps) shepherd every proposed change through a well-defined change management process. This process takes time to complete and so when it comes to the urgency of patching a newly-discovered security vulnerability, it c ...
Save
Like
02/14/2019
Follow
245
The Growing Surface of Attack and What Cybercrime has in Common with Street Crime [Q&A with Steve Morgan of Cybersecurity Ventures]
by BricataTrillion with a “T.” Cybercrime damages will cost $6 trillion annually across the globe by 2021. That’s double the figure from 2015, which came in at about $3 trillion. It’s a number that’s calculated by an organization called Cybersecurity Ventures, a cybersecurity media property, founded by Steve Morgan.As astonishing as those numbers are, Mr. Morgan believes the estimates are misunderstood. This is because he draws a parallel between street crime and historical popula ...
Save
Like
01/29/2019
Follow
43
Amid AI and Machine Learning, the Human Touch Remains Crucial to Cybersecurity in 2019, New Network Security Survey Finds
by BricataAmid the fervor over artificial intelligence (AI) and machine learning, it’s easy to lose sight of just how important human involvement is in cybersecurity, a new survey finds.We know network security is complicated and becoming increasingly complex given a multitude of reasons including sophisticated attacks, the proliferation of IT infrastructure and changes stemming from IoT, cloud adoption and BYOD, among others. So, the Bricata team conducted a survey to ask cybersecurity profes ...
Save
Like
01/09/2019
Follow
58
Network Visibility: Can You Analyze Encrypted Traffic for Cybersecurity Threats?
We get this question a lot: Can you analyze encrypted traffic for cyber threats?It just came up again during the question and answer section of our most recent webinar about threat hunting, so we thought it would be useful to answer it here.The short answer is yes, you can analyze encrypted network traffic, though there are caveats. For example, you cannot read the contents of encrypted traffic that uses the Secure Sockets Layer or Transport Layer Security (SSL/TLS) protocols, whi ...
Save
Like
12/12/2018
Follow
69
Here is How Open Source DIY Fatigue Saps Cybersecurity Resources
by BricataThe build vs. buy debate is a longstanding point of evaluation in open source cybersecurity tools. Recently, we’ve seen the do-it-yourself (DIY) theme reemerge among time-pressed security professionals because they wind up working to keep their open source creations up-to-date – rather than securing the enterprise.This tends to happen in organizations trying to save money. Often it starts by tasking someone with technical skills, but not necessarily cybersecurity skills, with defen ...
Save
Like
12/01/2018
Follow
167
The Mixed Forecast for Cybersecurity during Black Friday and Cyber Monday
by BricataThe first nine months of 2018 have not been easy in cybersecurity circles. Reporting indicates that while breaches and records exposed are down slightly, the statistics are still staggering: 3,676 breaches and 3.6 billion compromised records, according to Dark Reading.What does that mean for the online holiday shopping period about to begin? We canvased security-focused corners the web to look for forecasts and narrowed a long list of citations down to five reliable sources.Y ...
Save
Like
11/21/2018
Follow
816
The Bro Project Renames Bro IDS to Zeek IDS
by BricataOne of the most powerful cybersecurity tools you have never heard of just got a new name.The team leading The Bro Project has renamed the project to Zeek. The name change was announced to the open source community attending its annual conference, BroCon 2018, that wrapped up in mid-October.For about 20 years, the project has championed the Bro IDS framework, which is a very powerful network monitoring tool that can capture hundreds of metadata fields about ...
Save
Like
11/13/2018

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel