Stamus Networks is excited to return to Black Hat Europe 2024 at Excel London, United Kingdom 9-12...
Dallon Robinette
Recent Posts
Stamus Networks is excited to announce that our co-founders Éric Leblond (Chief Technology Officer)...
Determining whether or notNetwork Detection and Response (NDR) is right for your organization, and...
The rapid proliferation of IoT devices, network devices, and cloud infrastructure has drastically...
As any seasoned security professional will likely tell you, detecting a threat is only part of the...
Over the course of the last decade, Network Detection and Response (NDR) naturally evolved out of...
Intrusion detection systems (IDS) have proven themselves to be incredibly effective tools when it...
If your organization is considering network detection and response (NDR) and evaluating potential...
For many cybersecurity practitioners, the concept of alert fatigue is not foreign. However, knowing...
Don’t let the disarming name fool you.Charming Kitten, also known as APT 35, Newscaster Team, Ajax...
Continuous security monitoring (CSM) is a term that frequently comes up when discussing network...
When assessing the options available, it can be difficult to understand the nuances between various...
Tl:DR: A Large U.S. university lacked sufficient visibility into a large segment of its environment...
Cybersecurity alert fatigue is a serious problem faced by many organizations. An overwhelming...
It is easy to confuse intrusion detection systems (IDS) with intrusion prevention systems (IPS),...
“By failing to prepare, you are preparing to fail.” - Benjamin Franklin
No conversation about intrusion detection systems is complete without also taking time to look at...
One of the most common questions people have about intrusion detection systems (IDS) is where to...
TL;DR: An American school district needed to monitor over 5000 school-owned student devices, making...
To create an effective cyber security strategy, organizations must first have a good understanding...
You might be aware that intrusion detection systems (IDS) are incredibly effective ways to identify...
TL;DR: A European managed security service provider seeking to launch an MDR service chose Stamus...
In this blog post, we delve into the key requirements of network detection and response (NDR),...
For those new to the world of intrusion detection systems (IDS), you may be unaware that there are...
Network detection and response (NDR) is a critical component of a comprehensive cyber defense...
Network Detection and Response (NDR) is a highly capable cyber security solution for proactively...
For those new to open-source network security tools, learning the differences in various options...
Did you know there are actually several different IDS detection types used by different intrusion...
Network detection and response (NDR) plays a vital role in many organization’s cyber security...
One cannot compare Suricata vs Zeek without also comparing these tools to the popular Snort. While...
Intrusion detection systems are an incredibly popular first line of defense for many organizations...
Cybersecurity is always changing, and as new product categories continuously enter the market it is...
When discussing open-source intrusion detection tools, only three names routinely appear as IDS...
For absolute beginners in the world of intrusion detection systems (IDS), it is important to know...
Understanding the benefits of network detection and response (NDR) can be difficult if you are...
One cannot talk about intrusion detection systems (IDS) without also discussing intrusion...
If you’ve been keeping up to date with the Stamus Networks blog, then you are likely well...
Deciding between open-source network security tools can be a difficult task, but once you’ve...
Choosing which intrusion detection system (IDS) is hard enough, but it gets even more difficult...
Network detection and response (NDR) is becoming an increasingly popular topic in cyber security....
No conversation about open-source intrusion detection tools is complete without the inclusion of ...
Like firewalls, intrusion detection systems (IDS) are incredibly popular early lines of defense for...
Network Detection and Response (NDR) is an incredibly effective threat detection and response...
Many people mix up the different types of intrusion detection systems (IDS), but it is very...
Network detection and response (NDR) is a growing product category in cybersecurity. If you are...
When it comes to open-source intrusion detection tools, there are only three systems that any...
Before deciding on whether or not an intrusion detection system (IDS) might be right for your...
Network Detection and Response (NDR) comes with several advantages for organizations looking to...
Choosing between the various options for open-source intrusion detection tools can be a difficult...
Understanding the nuances of different types of intrusion detection systems (IDS) can be tricky,...
Gartner is a highly respected voice when it comes to recommendations on cybersecurity products....
When discussing intrusion detection systems (IDS), or more specifically network intrusion detection...
Network detection and response (NDR) has been steadily increasing in popularity as organizations...
Cozy Bear — also known as APT29, CozyCar, CozyDuke, and others — is a familiar name to security...
Many professionals in cybersecurity often look to research firm Gartner for insights into new...
In cyber security, we commonly talk about different product categories like intrusion detection...
Network detection and response (NDR)is beginning to play a larger role in many organizations’...
Suricata vs Snort? Choosing between these two incredibly popular open-source intrusion detection...
It is easy to get confused about the various types of intrusion detection system (IDS) examples,...
In the early stages of learning about Network detection and response (NDR), it can be difficult to...
Comparing Suricata vs Snort isn’t always easy. Both options are incredibly popular intrusion...
Before making any decisions on using an intrusion detection system (IDS), it is vitally important...
Network detection and response (NDR) is still a newer product category in cyber security, and as a...
For those new to network detection and response (NDR), it can be confusing to understand the...
Operating since 2008, the shadowy figure of Fancy Bear has emerged as a formidable force in the...
The cybersecurity landscape is constantly changing, with threat actors always looking for new...
As cloud and hybrid environment adoption grows, so does the need for network detection and response...
Network detection and response (NDR) could be the answer your organization is looking for to solve...
Network detection and response (NDR) has been quickly gaining ground as a respected cyber security...