Tag: Threat Detection

Check all articles
Blog
DDoS Attacks- Part 1: Types and Evolution
This post, the first part of our comprehensive DDoS series, will explore the fundamentals of DDoS attacks, their primary types, and the mechanisms behind each. By understanding these attack methods, organizations can better prepare to defend against them.
Paweł Drzewiecki
23/07/2025
Read more >
Blog
How to use multi-layered approach in the cybersecurity strategy
An overview of key cybersecurity product categories.
Marcin Kaźmierczak
22/05/2025
Read more >
Blog
How to detect network artifacts related to APT28 in Sycope?
Detecting network artefacts related to APT28 involves a combination of network monitoring, threat intelligence, and security best practices.
Marcin Kaźmierczak
21/05/2025
Read more >
Blog
Analysis of security events in Sycope NSM
Sycope is a network monitoring system designed to detect network anomalies and security threats based on Netflow and pcaps
Paweł Drzewiecki
20/05/2025
Read more >
Blog
How to monitor encrypted traffic in Sycope?
Due to the prevalence of encrypted traffic in organizations, monitoring it as a technique can be particularly advantageous.
Paweł Drzewiecki
16/04/2025
Read more >
Blog
The cyberattacks – reminder of the importance of network monitoring and security
Remain alert. The cyberattacks are a stark reminder of the importance of cybersecurity and network monitoring in today's world.
Paweł Drzewiecki
16/04/2025
Read more >
Blog
How to effectively implement the threat modeling process?
What is threat modelling and how to design the process that can be applied to a wide range of infrastructures and business models.
Paweł Drzewiecki
16/04/2025
Read more >
Blog
Threat Hunting – how to hunt for a security threats?
When detection mechanisms rely on patterns and signatures, and adversaries often switch tactics, threat hunting process comes to the rescue.
Paweł Drzewiecki
16/04/2025
Read more >
Blog
Can network flow monitoring be important source of data for detecting DoS attacks?
Each Incident handler should have a Network Visibility system in their arsenal to be able to analyse the network characteristics.
Paweł Drzewiecki
16/04/2025
Read more >
Blog
How historical data insights give us great analytical capabilities
Tools that analyse historical data insights come to the rescue when we need to know how many internet connections they are now or tomorrow.
Maciej Wilamowski
16/04/2025
Read more >
This site is registered on wpml.org as a development site. Switch to a production site key to remove this banner.