Artificial Intelligence in Cybersecurity
In the contemporary cybersecurity field, the evolution of artificial intelligence (AI)-driven threats is transforming the cyberattack landscape, equipping attackers with sophistica...
Types of DDoS attacks
(Part 1) Distributed denial of service (DDoS) is a broad class of cyber attack that disrupts online services and resources by overwhelming them with traffic. This rend...
What is Network Detection and Response (NDR)?
Network Detection and Response (NDR) is a cybersecurity solution that continuously monitors network traffic to detect and respond to threats in real time. Unlike traditional tools ...
What is Network Discovery?
While we would all like to think that our networks are perfectly maintained and documented, the reality is that sometimes you lose track of them. In some cases, the network can g...
What is Extended Detection and response (XDR)?
You've probably read an article, watched a talk or listened to a webinar about what the term XDR, also known as extended detection and response, is. The cyber security research fir...
How SIEM correlation rules work
SIEM is a powerful security tool when implemented correctly. Network security devices such as IDS devices, IPS devices and firewalls generate a large number of logs. A well-confi...
What is an advanced persistent threat?
As the threat landscape evolves faster than we can keep up with, organizations need to be aware of the type of threats they may face. Certain types of threats, such as ransomware...
How can DPI be used in security?
After the last post where we learned about deep packet inspection (DPI), we will talk about how this tool can be used in security products such as redborder. 1. The DPI exam...