Stamus Networks Blog

We believe that sharing information is necessary to improve global security. The purpose of this blog is to share our experiences, perspectives and experiments.

Subscribe to our Blog

Blog /
Showing 15 results
of 15 items.
Reset All

Category

Ken Gramley

Ken Gramley
Ken is chief executive officer at Stamus Networks. He has over 20 years of experience in building and leading high-tech companies. He has served as a top executive at several technology, network and security organizations, including as CEO of Emerging Threats and co-founder and VP of Engineering at both Covelight Systems and Hatteras Networks. Ken resides in North Carolina, USA.
Find me on:

Recent Posts

Stamus Networks Secures Series A Funding to Empower more Elite Defenders

Today I am thrilled to share some incredible news. It is with great excitement and pride that I...

2022 Wrapped

2022 is coming to an end, and as we wrap up another great year at Stamus Networks I wanted to take...

Reflections on Suricon 2022

Last week our team was in Athens for the biggest Suricata conference this year - Suricon 2022. The...

Stamus Networks at Suricon 2022

Each year, Suricon attracts visitors from all over the world for three days of knowledge sharing...

Reflections on Black Hat USA 2022

Last week Stamus Networks participated in BlackHat USA 2022, an international cybersecurity...

Celebrate the Defenders

When the leadership team at Stamus Networks sat down to discuss our core principles we had to...

Avoid Hype, Fear, and Exaggeration

When a company decides to capture its core principles, it is important to set expectations on how...

Embrace Open Interfaces and Open Source

When the leadership team at Stamus Networks got together to capture the core principles of our...

Apply the right technology to the right problems.

In developing our core principles, the leadership team at Stamus Networks discussed the way we view...

Show Respect and Integrity in Everything We Do.

Trust is the foundation of any working relationship. Without it, two organizations cannot amicably...

Deliver the Most Useful Detection, Period.

Successful businesses need to maintain a transparent framework which guides their daily practices....

Why We Developed Our Core Principles

When someone sees a great product, the reaction is often the same. Customers frequently consider...

Detection Technology Truth-telling and a Focus on Results

In my last blog article, I introduced some of the factors that have contributed to our successes...

Much more than just another NDR Vendor

In cybersecurity as soon as you stand still, you’re falling behind. Change, whether it’s in the...

Endpoint-Based and Network-Based Threat Hunting — Each Has its Strengths

Threat hunting—the proactive detection, isolation, and investigation of threats that often evade...