The evidence bank: leveraging security's most valuable asset
Organizations often implement a data collection strategy out of fear, collecting everything “just in case.” I challenge the assumption.
Corelight recognized as a leader in the 2025 Gartner Magic Quadrant™ for network detection and response
Corelight recognized as a leader in the 2025 Gartner Magic Quadrant™ for network detection and response
Feel free to edit this text to reflect your unique voice and message. Tell visitors what you do, why you do it, and what sets you apart.
Organizations often implement a data collection strategy out of fear, collecting everything “just in case.” I challenge the assumption.
The most sophisticated cyber defense teams in the world have shifted their strategies towards the collection and analysis of high-quality evidence.
The blog covers a third log4j detection method, this one focused on the second-stage download that happens after the first stage completes.
We recently discussed some methods for detecting the Log4j exploit, and we’ve developed another method that one running Zeek® or a Corelight sensor...
Simplify the detection of CVE-2021-44228 exploit (the log4j 0-day known as Log4Shell) with Corelight.
The SSH Inference package installs on sensors with a few clicks and provides network traffic analysis (NTA) inferences on live SSH traffic.
I’m seven months into a new job here at Corelight as a product manager, and I’m still as excited about Zeek as I was last month about Zeek Week....
Corelight just released our v17 software. Here are the details about how these new features can enhance your data, speed up your IR workflow, and...