How Can Kill Webs Change Security Thinking?
Learn how the kill web concept can be applied to cybersecurity, and how it addresses some of the concerns with the kill chain.
Corelight recognized as a leader in the 2025 Gartner Magic Quadrant™ for network detection and response
Corelight recognized as a leader in the 2025 Gartner Magic Quadrant™ for network detection and response
Feel free to edit this text to reflect your unique voice and message. Tell visitors what you do, why you do it, and what sets you apart.
Learn how the kill web concept can be applied to cybersecurity, and how it addresses some of the concerns with the kill chain.
This article proposes ways that modern network-derived evidence applies to the kill chain.
What do I say if my team discovers a breach of our digital assets? This is a question that requires understanding “defensible disclosure.”
This post contains a warning and a solution for anyone using BPF syntax when filtering traffic for network security monitoring.
This blog post explains three levels of analysis and how encryption has affected NSM, demonstrating that NSM remains relevant, despite encryption.
Richard shared his thoughts on our blog on why the overarching role of the network and election infrastructure is worthy of a deep assessment right...
Here's how to instrument and enable network security monitoring for a small office – home office (SOHO) environment.
Security teams would benefit from reviewing their NSM data to ensure that only authorized parties are interacting with their remote work...
Anyone worrying about detecting and responding to network resident threats would benefit from the data that Corelight provides.
RSA 2020 is fast approaching. The speaker sessions seem to be of high quality overall, but here are the 12 talks you should consider attending.