Skip to content
  • There are no suggestions because the search field is empty.

Corelight recognized as a leader in the 2025 Gartner Magic Quadrant™ for network detection and response

Corelight recognized as a leader in the 2025 Gartner Magic Quadrant™ for network detection and response

Corelight Bright Ideas Blog

This is the Custom Rich Text module

Feel free to edit this text to reflect your unique voice and message. Tell visitors what you do, why you do it, and what sets you apart.

Blog Dashboard

Stories by Richard


command and control

How Can Kill Webs Change Security Thinking?

Learn how the kill web concept can be applied to cybersecurity, and how it addresses some of the concerns with the kill chain.

network detection response

Network evidence for defensible disclosure

What do I say if my team discovers a breach of our digital assets? This is a question that requires understanding “defensible disclosure.”

Zeek

Mixed VLAN tags and BPF syntax

This post contains a warning and a solution for anyone using BPF syntax when filtering traffic for network security monitoring.

Network Security Monitoring

Enabling SOHO Network Security Monitoring

Here's how to instrument and enable network security monitoring for a small office – home office (SOHO) environment.

Zeek

Countering network resident threats

Anyone worrying about detecting and responding to network resident threats would benefit from the data that Corelight provides.

Zeek

12 talks to see at RSA 2020

RSA 2020 is fast approaching. The speaker sessions seem to be of high quality overall, but here are the 12 talks you should consider attending.