Sycope Blog

Learn more from the blogposts with easy filters - explore posts by favorite topic or product below.

Learn more
This week top blog posts
Check all articles
Filter:
Clear all filters
Blog
How to effectively implement the threat modeling process?
What is threat modelling and how to design the process that can be applied to a wide range of infrastructures and business models.
Jan Rześny
16/04/2025
Read more >
Blog
The cyberattacks – reminder of the importance of network monitoring and security
Remain alert. The cyberattacks are a stark reminder of the importance of cybersecurity and network monitoring in today's world.
Jan Rześny
16/04/2025
Read more >
Blog
How to detect network IoCs (URLs, Domains and IPs) in context of SNOWYAMBER, HALFRIG and QUARTERRIG in Sycope NSM?
SKW and CSIRT NASK observed a wide-ranging espionage campaign related to Russian secret services.
Jan Rześny
16/04/2025
Read more >
Blog
Data role-based access control (RBAC) do you need that?
Data role-based access control (data RBAC) is an important feature helping you to mitigate the risk of data breaches.
Jan Rześny
16/04/2025
Read more >
Blog
How to monitor encrypted traffic in Sycope?
Due to the prevalence of encrypted traffic in organizations, monitoring it as a technique can be particularly advantageous.
Jan Rześny
16/04/2025
Read more >
Blog
ATT&CK MITRE as an effective method of defence against cyber threats
In the face of cybersecurity threats, teams that respond to security incidents need greater skill and operational efficiency.
Jan Rześny
16/04/2025
Read more >
Blog
Can network flow monitoring be important source of data for detecting DoS attacks?
Each Incident handler should have a Network Visibility system in their arsenal to be able to analyse the network characteristics.
Jan Rześny
16/04/2025
Read more >
Blog
How to detect network artifacts related to APT28 in Sycope?
Detecting network artefacts related to APT28 involves a combination of network monitoring, threat intelligence, and security best practices.
Jan Rześny
21/05/2025
Read more >
Blog
New release Sycope 3.0
Sycope announces the latest release of its network traffic and security monitoring software is first and foremost a huge number of new built-in views for data analysis.
21/05/2025
Read more >
Blog
NPM and NDR: Complementary Tools for Network Security and Performance
Network security and performance are two primary concerns for any organization that relies heavily on its network infrastructure.
Jan Rześny
21/05/2025
Read more >
Blog
Leveraging the nTop nDPI for Application Visibility within Sycope/nProbe integration
Gaining insight into Layer 7 application is one of the crucial advantages for network monitoring in areas of performance and security.
Jan Rześny
21/05/2025
Read more >
Blog
Detecting resources and their connections based on NetFlow clients, servers, applications, and other network elements
Let's discuss what we can obtain by creating an inventory using NetFlow packets.
Jan Rześny
22/05/2025
Read more >