Network monitoring and security insights from Sycope

Read and watch news, best practices, tips and tricks from NDR world, prepared by experts and our engineers.

Learn more
This week top knowledge
Important datasheets and brochures
Check all resources
Filter:
Clear all filters
Blog
How to detect unknown devices in the network?
Passive device detection without scans, agents, or interference with infrastructure.
Marcin Kaźmierczak
23/03/2026
Read more >
Video
Webinar: How LinkSense delivers lightweight open source synthetic monitoring
LinkSense is a lightweight synthetic monitoring tool designed to deliver essential monitoring capabilities without adding unnecessary complexity. If you’re interested in monitoring without unnecessary complexity, vendor lock-in or excessive resource overhead, this session is for you.
Maciej Wilamowski, Marcin Kaźmierczak
09/03/2026
Watch the video >
Blog
What is a DDoS attack and how to defend against it in 2026
DDoS attacks are one of the biggest cyber threats today – capable of crippling banks, online stores, and public services. In 2026, they are stronger than ever. Learn what they are, how they work, and how to defend against them effectively.
Paweł Drzewiecki
02/03/2026
Read more >
Blog
One step closer to zero-configuration Sycope: phpIPAM integration (Hosts & Subnets)
Integration between Sycope and phpIPAM enables zero-configuration of the primary Lookup Hosts & Subnets, delivering inventory details of network infrastructure used by Host & Subnet dashboards, filters, rules, and many other features.
Marcin Kaźmierczak
02/02/2026
Read more >
Blog
Compliance and regulation with Sycope
Cybersecurity compliance has become a strategic responsibility for executive leadership and public institutions. Regulations such as NIS2, DORA, and sector-specific national laws require organizations to not only protect their infrastructure, but to prove continuous control, resilience, and accountability.
Radu Dmitru
22/01/2026
Read more >
Video
Sycope System Guide, part 1: Interface, core concepts & workflows
This video is the first part of the Sycope system guide. It presents the main elements of the user interface, explains the core concepts behind the platform, and demonstrates basic workflows. Watch to learn how Sycope helps you navigate, understand, and operate within the system effectively.
Marcin Kaźmierczak
18/12/2025
Watch the video >
Video
Webinar: Smarter networks start here! Why and how you can use network automation in your IT network
Next webinar with our expert, Marcin Kazmierczak, that will cover the topic of network automation in IT infrastructure, less manual work and smarter networks, by using Sycope.
Marcin Kaźmierczak
18/12/2025
Watch the video >
Video
Webinar: Achieve faster incident response with Sycope’s NDR capabilities
See how you can achieve faster incident response in the Sycope system – a live demo conducted by our expert, Piotr Kałuża.
Piotr Kałuża
18/12/2025
Watch the video >
Blog
Golden Ticket attack – detecting Kerberos attacks and securing Active Directory
The Golden Ticket attack is the holy grail for attackers – it enables them to take full control over a domain. In this article, we explain how advanced Kerberos attacks work and why monitoring network anomalies is crucial for effective Active Directory security.
Paweł Drzewiecki
08/12/2025
Read more >
Blog
IDOR vulnerability – how to detect an attack on web applications through HTTP traffic analysis
The IDOR vulnerability (Insecure Direct Object References) is one of the most common weaknesses in web application security. In this article, we explain how to detect an active IDOR attack by analyzing unusual patterns in HTTP traffic analysis and how network monitoring supports effective API protection.
Paweł Drzewiecki
28/11/2025
Read more >
Blog
Zero Trust architecture – the role of network visibility and microsegmentation in security
Zero Trust architecture is based on the principle “never trust, always verify.” The foundation of its implementation is one hundred percent network visibility, which enables the verification of every connection and effective microsegmentation. We explain how to start building a mature security architecture.
Paweł Drzewiecki
21/11/2025
Read more >
Blog
ARP spoofing – how to detect a Man-in-the-Middle attack and ARP poisoning in a LAN network
ARP spoofing is one of the most dangerous internal attacks, leading to full control over network traffic. In this article, we explain how ARP poisoning works and how network traffic analysis enables real-time detection of a Man-in-the-Middle attack, ensuring essential LAN security.
Paweł Drzewiecki
14/11/2025
Read more >
This site is registered on wpml.org as a development site. Switch to a production site key to remove this banner.