Welcome to our blog, where we share news and observations from the world of network monitoring and security, with comments from our engineers.
How to use inter-system correlations, optimizing work of SIEM systems and processing billions of flows in dedicated system.
When detection mechanisms rely on patterns and signatures, and adversaries often switch tactics, threat hunting process comes to the rescue.
Tools that analyse historical data insights come to the rescue when we need to know how many internet connections they are now or tomorrow.
In the face of cybersecurity threats, teams that respond to security incidents need greater skill and operational efficiency.
What will the future bring us? We asked this question in the context of network monitoring and the general IT world.
If you didn't find anything interesting here, check out other resources