Tag: Security

Check all articles
Video
How do you drill down data?
Easy top-down access: drill down mechanisms enable viewing of data for a specific port, interface or IP address
Watch >
Video
How to view original flows related to a given alert?
Gain better understanding what happened in your network, check the nature of the attack, and take steps to prevent it from happening again.
Watch >
Blog
Data Deduplication and NetFlow: How to Save Storage Space and Improve Data Analysis
Discover how to save storage space and improve data analysis using this simple methods.
Paweł Drzewiecki
16/04/2025
Read more >
Blog
How to monitor encrypted traffic in Sycope?
Due to the prevalence of encrypted traffic in organizations, monitoring it as a technique can be particularly advantageous.
Paweł Drzewiecki
16/04/2025
Read more >
Blog
The cyberattacks – reminder of the importance of network monitoring and security
Remain alert. The cyberattacks are a stark reminder of the importance of cybersecurity and network monitoring in today's world.
Paweł Drzewiecki
16/04/2025
Read more >
Blog
Data role-based access control (RBAC) do you need that?
Data role-based access control (data RBAC) is an important feature helping you to mitigate the risk of data breaches.
Paweł Drzewiecki
16/04/2025
Read more >
Blog
How to detect network IoCs (URLs, Domains and IPs) in context of SNOWYAMBER, HALFRIG and QUARTERRIG in Sycope NSM?
SKW and CSIRT NASK observed a wide-ranging espionage campaign related to Russian secret services.
Maciej Wilamowski
16/04/2025
Read more >
Blog
How to effectively implement the threat modeling process?
What is threat modelling and how to design the process that can be applied to a wide range of infrastructures and business models.
Paweł Drzewiecki
16/04/2025
Read more >
Blog
New release v.2.2
New version of Sycope software is ready! Including dynamic baseline and possibility to add custom NetFlow fields.
Magda Bącela
16/04/2025
Read more >
Blog
Threat Hunting – how to hunt for a security threats?
When detection mechanisms rely on patterns and signatures, and adversaries often switch tactics, threat hunting process comes to the rescue.
Paweł Drzewiecki
16/04/2025
Read more >
This site is registered on wpml.org as a development site. Switch to a production site key to remove this banner.