What makes evidence uniquely valuable?
Learn about the attributes of high-quality evidence. What should evidence look like, in order to be useful to defenders when the next security event...
Corelight recognized as a leader in the 2025 Gartner Magic Quadrant™ for network detection and response
Corelight recognized as a leader in the 2025 Gartner Magic Quadrant™ for network detection and response
Feel free to edit this text to reflect your unique voice and message. Tell visitors what you do, why you do it, and what sets you apart.
Learn about the attributes of high-quality evidence. What should evidence look like, in order to be useful to defenders when the next security event...
CISA recently released a set of playbooks for the Federal Civilian Executive Branch (FCEB). Here's why we are blogging about this.
In this blog we aim to provide a little insight into part of the lifecycle of Corelight Lab’s response to a critical HTTP vulnerability.
Learn how you can use Zeek to detect this level of cunning evasion tactics in your own retrospective hunts and forensic investigations.
FireEye’s threat research team has discovered a troubling new supply chain attack targeting SolarWind’s Orion IT monitoring and management platform.