Archives: Events

Views Navigation

Event Views Navigation

Today

Hands-On Session – Get to Know Suricata Language Server with Eric Leblond

Writing signatures for Suricata and other intrusion detection systems (IDS) is considered by many to be a form of art. One of the main reasons is that the rule writer needs to start by examining a network trace to identify patterns that are representative to a threat/behavior without being too broad (to avoid false positives) […]

Hands-On Session: Detect Lateral Movement in Microsoft Environment with Suricata (Part 1)

Suricata is the world-renowned IDS / IPS and NSM engine. It is capable of generating a combined log stream from separate information elements, including network protocol events, alerts, PCAP files (full packet capture), and extracted files as it sniffs live network traffic or sits inline. Suricata produces over 25 different types of log data, including […]

Live Event with Pluralsight: Open-Source Security – Analyzing Network Traffic with Suricata

In today’s environment of reduced budgets, loss of talent, and more breaches than ever before, how do you stop the adversary before they are able to compromise your environment? In this livestream we’ll be talking with OISF’s own Josh Stroschein, and discussing the capabilities of Suricata, an open-source threat detection engine. Join us to hear […]

Webinar – Suricata Metadata Analysis and Threat Hunting with CrystalEye XDR

Suricata has the ability to output alerts, anomalies, metadata, file info and protocol-specific records through JSON EVE output. In this webinar, we’ll explore how we can use Suricata event data for threat detection and prevention by enriching, processing and logging EVE JSON output to MongoDB in real-time. We will also analyze threat hunting reports with […]

Hands On Session: Detect Lateral Movement in Microsoft Environment with Suricata (Part 2)

Suricata is the world-renowned IDS / IPS and NSM engine. It is capable of generating a combined log stream from separate information elements, including network protocol events, alerts, PCAP files (full packet capture), and extracted files as it sniffs live network traffic or sits inline. Suricata produces over 25 different types of log data, including […]

Free