Stamus Networks Blog

We believe that sharing information is necessary to improve global security. The purpose of this blog is to share our experiences, perspectives and experiments.

Subscribe to our Blog

Blog /
Showing 6 results
of 6 items.
Reset All

Category

Uncovered: Uncovering Misconfigured Devices & Applications with Clear NDR

The example outlined in this blog article demonstrates Clear NDR’s value in delivering visibility...

Uncovered: Detecting Misconfigured Web Server via Unstructured Hunting in Clear NDR

The following example is of an unstructured hunt technique—an investigation based on an idea or...

Introducing Clear NDR™

At Stamus Networks, we have always been driven by a commitment to openness, transparency, and...

Demystifying the Cyber Kill Chain: Understanding the Stages of a Cyber Attack

The cyber kill chain is a widely-used framework for tracking the stages of a cyber attack on an...

Hunting for Unauthorized FTP Usage

This week’s guided threat hunting blog focuses on a specific policy violation - the use of...