Palo Posts: How To Guides For Palo Alto Firewalls

Palo Posts: How To Guides For Palo Alto Firewalls

Palo Alto manufactures industry-leading firewall hardware, combining a number of traditional security point solutions into one singular platform. The following is a collection of how to guides to help you get the most out of your Palo Alto firewall. Palo Alto Firewall: Home Network Palo…

Zeekurity Zen – Part IV: Threat Hunting With Zeek

Zeekurity Zen – Part IV: Threat Hunting With Zeek

This is part of the Zeekurity Zen Zeries on building a Zeek (formerly Bro) network sensor. Overview In our Zeek journey thus far, we’ve: Set up Zeek to monitor some network traffic. Used Zeek Package Manager to install AF_PACKET and other useful packages. Configured Zeek…

The Fal.Con Has Landed

The Fal.Con Has Landed

California Dreamin’ In early November 2019, I found myself in sunny California for CrowdStrike’s third annual Fal.Con UNITE conference at the Sheraton San Diego Hotel & Marina.  As a big fan of the CrowdStrike platform, I was excited that CrowdStrike invited me to hear about…

Zeekurity Zen – Part II: Zeek Package Manager

Zeekurity Zen – Part II: Zeek Package Manager

This is part of the Zeekurity Zen Zeries on building a Zeek (formerly Bro) network sensor. Overview In our Zeek journey thus far, we’ve: Set up Zeek to monitor some network traffic. Now we’ll introduce the Zeek Package Manager to extend Zeek’s functionality with packages…

Zeekurity Zen Zeries

Zeekurity Zen Zeries

Zeek (formerly named Bro) is my favorite network security monitoring platform, and I’ve used and promoted it throughout my career.  It generates rich network metadata that’s incredibly valuable for incident response, forensics, and general troubleshooting. For most people, the main challenge with using Zeek is in setting…

How to Choose the Right EPP / EDR Solution

How to Choose the Right EPP / EDR Solution

This post is featured on the CrowdStrike Blog. Introduction Like most cybersecurity professionals, you’re looking for an EPP that protects against current and evolving threats, is easy to deploy and manage, and is ultimately invisible to end-users.  Today, there are dozens of these platforms available, and…

Zeekurity Zen – Part III: How to Send Zeek (Bro) Logs to Splunk

Zeekurity Zen – Part III: How to Send Zeek (Bro) Logs to Splunk

This is part of the Zeekurity Zen Zeries on building a Zeek (formerly Bro) network sensor. Overview In our Zeek journey thus far, we’ve: Set up Zeek to monitor some network traffic. Used Zeek Package Manager to install AF_PACKET and other useful packages. Now we’ll…

Zeekurity Zen – Part I: How to Install Zeek (Bro) on CentOS 8

Zeekurity Zen – Part I: How to Install Zeek (Bro) on CentOS 8

This is part of the Zeekurity Zen Zeries on building a Zeek (formerly Bro) network sensor. Overview This guide assumes you’ll be installing Zeek on CentOS 8, given how popular CentOS tends to be in the enterprise.  However, the guide should work for any RHEL-based…