What is ‘Weird’ in Zeek?

By:  Fatema Bannat Wala, Security Engineer, University of Delaware As you probably know, Zeek transforms network traffic into real-time logs used by threat hunters, incident responders, and network operators. Most of these logs correspond to common network...

ZeekWeek 2019 – Summary and Slides

The global community of Zeek developers and users gathered together in Seattle last month, October 8-11, for the annual ZeekWeek (formerly BroCon) event. 171 network security professionals representing 84 organizations travelled from all over the world to share ideas...

ZeekWeek Q&A with the Community: Bricata

by Amber Graner, Zeek Director of Community As ZeekWeek gets underway, we wanted to find out what’s new among members of the Zeek Community. Accordingly, we had a chance to catch up with the Bricata team. Bricata is a contributor to the Zeek community, and supporter...