Stamus Networks Blog

We believe that sharing information is necessary to improve global security. The purpose of this blog is to share our experiences, perspectives and experiments.

Subscribe to our Blog

Blog /
Showing 4 results
of 4 items.
Reset All


The Path to Data Sovereignty: Key Considerations for Security Telemetry

Most enterprise organizations gather extensive security data from their information (IT) and...

Ready for Battle? Live Fire vs Tabletop Cybersecurity Exercises

By failing to prepare, you are preparing to fail.” - Benjamin Franklin

The Rise of Network Infrastructure Attacks and What to Do About Them

TL;DR: In recent months, CISA, MITRE,, and others have announced critical vulnerabilities...

Adapting to Change: JA3 Fingerprints Fade as Browsers Embrace TLS Extension Randomization

Recent changes to the behavior of major browsers have rendered the popular JA3 fingerprinting...