Stamus Networks Blog

We believe that sharing information is necessary to improve global security. The purpose of this blog is to share our experiences, perspectives and experiments.

Subscribe to our Blog

Blog /
Showing 77 results
of 77 items.
Reset All

Category

Dallon Robinette

Recent Posts

Stamus Networks at Black Hat Europe 2024

Stamus Networks is excited to return to Black Hat Europe 2024 at Excel London, United Kingdom 9-12...

Stamus Networks at Suricon 2024

Each year, Suricon attracts visitors from around the world for three days of training and...

See Stamus Networks at an Event Near You!

Stamus Networks is excited to announce that our co-founders Éric Leblond (Chief Technology Officer)...

Unpacking the 2024 Gartner® NDR Market Guide: Securing the Agentless Attack Surface

The rapid proliferation of IoT devices, network devices, and cloud infrastructure has drastically...

Unpacking the 2024 Gartner® NDR Market Guide: The Critical Role of Automated Response

As any seasoned security professional will likely tell you, detecting a threat is only part of the...

How do you Fix Alert Fatigue?

Intrusion detection systems (IDS) have proven themselves to be incredibly effective tools when it...

What are the Consequences of Alert Fatigue?

If your organization is considering network detection and response (NDR) and evaluating potential...

What are the Symptoms of Alert Fatigue?

For many cybersecurity practitioners, the concept of alert fatigue is not foreign. However, knowing...

The Hidden Claws of APT 35: Charming Kitten

Don’t let the disarming name fool you.Charming Kitten, also known as APT 35, Newscaster Team, Ajax...

What is Continuous Security Monitoring?

Continuous security monitoring (CSM) is a term that frequently comes up when discussing network...

What is Threat Detection and Reponse?

When assessing the options available, it can be difficult to understand the nuances between various...

In the Trenches with NDR: NDR Discovers Crypto Wallet Stealer on U.S. University's Network

Tl:DR: A Large U.S. university lacked sufficient visibility into a large segment of its environment...

What is Alert Fatigue in Cybersecurity?

Cybersecurity alert fatigue is a serious problem faced by many organizations. An overwhelming...

What is an Example of an Intrusion Prevention System?

It is easy to confuse intrusion detection systems (IDS) with intrusion prevention systems (IPS),...

Ready for Battle? Live Fire vs Tabletop Cybersecurity Exercises

By failing to prepare, you are preparing to fail.” - Benjamin Franklin

What are the 4 Types of Attacks in Network Security?

No conversation about intrusion detection systems is complete without also taking time to look at...

Does IDS/IPS go Before or After the Firewall?

One of the most common questions people have about intrusion detection systems (IDS) is where to...

In the Trenches with NDR: K-12 School District Maximizes Visibility While Avoiding Alert Fatigue

TL;DR: An American school district needed to monitor over 5000 school-owned student devices, making...

What is Detection and Response in Cyber Security?

To create an effective cyber security strategy, organizations must first have a good understanding...

Does Suricata Have a Web Interface?

Suricata is a powerful open-source network security tool. One of its disadvantages, however, is its...

What are the Types of Computer Attacks Detected by IDS?

You might be aware that intrusion detection systems (IDS) are incredibly effective ways to identify...

In the Trenches with NDR: European MDR Designs Advanced NDR into Their Product Offering

TL;DR: A European managed security service provider seeking to launch an MDR service chose Stamus...

What are the Requirements for Network Detection and Response?

In this blog post, we delve into the key requirements of network detection and response (NDR),...

Is There a GUI for Suricata?

Are you a Suricata beginner looking to learn more about open-source network-based intrusion...

What are the Three Types of IDS?

For those new to the world of intrusion detection systems (IDS), you may be unaware that there are...

In the Trenches with NDR: European Financial Institution Achieves Greater Network Visibility

Network detection and response (NDR) is a critical component of a comprehensive cyber defense...

What are the Benefits of NDR?

Network Detection and Response (NDR) is a highly capable cyber security solution for proactively...

Is Suricata an IPS or IDS?

For those new to open-source network security tools, learning the differences in various options...

What are the Detection Methods of IDS?

Did you know there are actually several different IDS detection types used by different intrusion...

What are NDR Solutions?

Network detection and response (NDR) plays a vital role in many organization’s cyber security...

What is the Difference Between Snort and Zeek?

One cannot compare Suricata vs Zeek without also comparing these tools to the popular Snort. While...

What are the Different Types of IDS Alerts?

Intrusion detection systems are an incredibly popular first line of defense for many organizations...

Is XDR the Same as NDR?

Cybersecurity is always changing, and as new product categories continuously enter the market it is...

Is Suricata Better Than Snort?

When discussing open-source intrusion detection tools, only three names routinely appear as IDS...

What are the Two Main Types of Intrusion Detection Systems?

For absolute beginners in the world of intrusion detection systems (IDS), it is important to know...

What is the Difference Between IDS/IPS and NDR?

Understanding the benefits of network detection and response (NDR) can be difficult if you are...

What are the Disadvantages of Suricata?

No open-source tool is perfect, and that stands true for Suricata. And while we believe that...

What is IPS in Cyber Security?

One cannot talk about intrusion detection systems (IDS) without also discussing intrusion...

What is the Difference Between EDR and XDR?

If you’ve been keeping up to date with the Stamus Networks blog, then you are likely well...

What is the Difference Between Zeek and Suricata Metadata?

Deciding between open-source network security tools can be a difficult task, but once you’ve...

What are the Advantages of Intrusion Detection Systems?

Choosing which intrusion detection system (IDS) is hard enough, but it gets even more difficult...

What is the Meaning of NDR?

Network detection and response (NDR) is becoming an increasingly popular topic in cyber security....

Is Suricata Open-Source?

No conversation about open-source intrusion detection tools is complete without the inclusion of ...

What is the Difference Between a Firewall and IPS?

Like firewalls, intrusion detection systems (IDS) are incredibly popular early lines of defense for...

What is NDR Used for?

Network Detection and Response (NDR) is an incredibly effective threat detection and response...

What is Open-Source Intrusion Detection?

While you might be familiar with Suricata due to its popularity in the world of network security,...

What are NIDS Tools?

Many people mix up the different types of intrusion detection systems (IDS), but it is very...

What is an NDR Provider?

Network detection and response (NDR) is a growing product category in cybersecurity. If you are...

What is an example of a Free Open-Source IDS?

When it comes to open-source intrusion detection tools, there are only three systems that any...

What are the Benefits of NIDS?

Before deciding on whether or not an intrusion detection system (IDS) might be right for your...

What are the Disadvantages of NDR?

Network Detection and Response (NDR) comes with several advantages for organizations looking to...

Which is Better, Suricata or Snort?

Choosing between the various options for open-source intrusion detection tools can be a difficult...

What is the Difference Between NIDS and IPS?

Understanding the nuances of different types of intrusion detection systems (IDS) can be tricky,...

What is NDR in Gartner?

Gartner is a highly respected voice when it comes to recommendations on cybersecurity products....

How Does Suricata Work?

Learning Suricata takes time and patience, and one of the more daunting tasks for beginners is...

What is Network Detection and Response?

Network detection and response (NDR) has been steadily increasing in popularity as organizations...

Behind the Curtain: Understanding Cozy Bear (APT29)

Cozy Bear — also known as APT29, CozyCar, CozyDuke, and others — is a familiar name to security...

What is a Rule in Suricata?

One of the most difficult parts of learning how to effectively use Suricata is understanding the...

Which Gartner Report Shows NDR is Becoming Mainstream?

Many professionals in cybersecurity often look to research firm Gartner for insights into new...

What Protocols are Used in Suricata?

Suricata is one of the most powerful open-source intrusion detection systems (IDS) available...

What is an Example and Application of Intrusion Detection?

In cyber security, we commonly talk about different product categories like intrusion detection...

What is the Role of NDR?

Network detection and response (NDR)is beginning to play a larger role in many organizations’...

What are the Benefits of Suricata?

Suricata vs Snort? Choosing between these two incredibly popular open-source intrusion detection...

What are the Types of Intrusion Detection Systems?

It is easy to get confused about the various types of intrusion detection system (IDS) examples,...

What are NDR Tools?

In the early stages of learning about Network detection and response (NDR), it can be difficult to...

Is Suricata any Good?

Comparing Suricata vs Snort isn’t always easy. Both options are incredibly popular intrusion...

What is an IDS and IPS Example?

Before making any decisions on using an intrusion detection system (IDS), it is vitally important...

What are the Features of NDR?

Network detection and response (NDR) is still a newer product category in cyber security, and as a...

What is the Difference Between NAV and NDR?

For those new to network detection and response (NDR), it can be confusing to understand the...

Behind the Curtain: Understanding Fancy Bear (APT 28)

Operating since 2008, the shadowy figure of Fancy Bear has emerged as a formidable force in the...

What are the Emerging Trends and Top Use Cases for Network Detection and Response?

The cybersecurity landscape is constantly changing, with threat actors always looking for new...

Why do I Need Network Detection and Response?

As cloud and hybrid environment adoption grows, so does the need for network detection and response...

What Challenges Does Network Detection and Response Solve?

Network detection and response (NDR) could be the answer your organization is looking for to solve...

Why is NDR so Important?

Network detection and response (NDR) has been quickly gaining ground as a respected cyber security...