Network security

Suricata: What is it and how can we use it

Learn about the open-source threat detection engine that is an intrusion detection system (IDS) and an intrusion prevention system (IPS).

Intrusion detection software best practices

Learn intrusion detection systems fundamentals and some of the best practices behind maintaining and tuning them.

What is intrusion detection?

Gain fundamental knowledge of intrusion detection and learn why it's crucial for network and endpoint security.

How to use Wireshark for protocol analysis: Video walkthrough

Learn how to analyze network traffic with the free protocol analyzer Wireshark and sniffing tool tcpdump. Then try it yourself!

9 best practices for network security

Network security is important for every organization, no matter how big or small. Here are some best practices.

Securing voice communications

Whether you're using Skype, Zoom or a custom-built system, securing voice communications is an important component of security.

Introduction to SIEM (security information and event management)

Learn all about SIEM, a software system that collects and aggregates data and events from various networking devices and resources.

VPNs and remote access technologies

What types of VPNs are available and how do they work. Learn about remote access VPNs, site-to-site VPNs, secure shell and more.

Cellular Networks and Mobile Security

Despite their seemingly endless coverage (your mileage will definitely vary), cellular network security has proven to be surprisingly robust over the years.

Secure network protocols

For a very long time, having devices just work on a network was a feat in itself. This meant that the protocols involved didn't necessarily need to be secure