Artur Kane

Artur was a Progress employee.

Articles by the Author

Beyond Traditional Defenses: Integrating IDS and NDR for Improved Detection Capabilities
AI-powered Network Detection and Response (NDR) solutions have become a staple for identifying the subtle indicators of unknown threats, a crucial element in the constant battle against cyberattacks. While NDR excels in unveiling the shadows of the unfamiliar, it is the traditional signature-based Intrusion Detection Systems (IDS) enabling security teams to maximize protection and facilitate targeted responses, particularly when confronting well-known malware. In this article, we delve into the distinct benefits of both AI-driven NDR and conventional approaches. We will also unravel compelling reasons why the integration of these technologies are strategic imperatives in assisting to fortify cybersecurity defenses.
Meeting the SEC's New Cybersecurity Rules: How Flowmon Empowers Companies to Comply
The much-anticipated cybersecurity rules by the US Securities and Exchange Commission (SEC) for public companies have arrived, signaling a significant step forward from the proposed rules released in March 2022. These final rules, effective July 26, 2023, introduce new obligations that public companies must adhere to, promising a more secure and transparent corporate landscape. However, these regulations bring significant compliance challenges and litigation risks. Public companies now face the need to assess their internal disclosure controls, enhance their cybersecurity risk management, and invest effort in drafting their cybersecurity disclosures.
Revised Flowmon interface: First step to customer-centric UX
Revised user interface as it comes with Flowmon 10.0 is one but important stop on our long term initiative that will end up with completely new concept of the Flowmon solution providing unified view across network, application and security dimensions. Let’s see what it brings.
What made us create Distributed Architecture
Developing hyper-scalable network analytics design, called Flowmon Distributed Architecture, was one of the biggest technology challenges we’ve faced to date. What were the drivers behind this resource demanding development project?
Monitor user behaviour to detect Insider Threats
The risk of Insider Threats has grown massively with attackers getting around the increasingly complex perimeter protection of Enterprise organisations. It is one of the most common ways customer data or industrial and trade secrets are leaked. This very complex topic includes countless types and techniques. Let us see how such behaviour could be detected at a network level.
HUNTING FREQUENT AND DANGEROUS #2: Protection against Malware, Ransomware and Zero-day exploit
In our previous articles we discovered the most common types of cyberattacks. We also learned how they are designed and how they operate. Such understanding helps us build adequate and effective protection strategies. This time we'll focus on Malware, Ransomware and Zero-day exploits.
Prefooter Dots
Subscribe Icon

Latest Stories in Your Inbox

Subscribe to get all the news, info and tutorials you need to build better business apps and sites

Loading animation