Stealthwatch and the risk of equating networking with security
Is next-generation IPS masking an old problem?
The dark side of Darktrace
Additional resources you might be interested in
Practical threat hunting in network metadata
Tracking the progression of an attack through Cognito Detect
Infographic: An inside look at RDP cyberattacker behaviors