Skip to content
  • There are no suggestions because the search field is empty.

Corelight recognized as a leader in the 2025 Gartner Magic Quadrant™ for network detection and response

Corelight recognized as a leader in the 2025 Gartner Magic Quadrant™ for network detection and response

Corelight Bright Ideas Blog

This is the Custom Rich Text module

Feel free to edit this text to reflect your unique voice and message. Tell visitors what you do, why you do it, and what sets you apart.

Blog Dashboard
Zeek

Small, fast and easy. Pick any three.

Zeek has been the darling of security defenders looking to get deep visibility into network traffic. Today, we are excited to announce the Software...

Zeek

DNS over TLS and DNS over HTTPS

In this post, we’ll explore DNS over TLS (DoT) and DNS over HTTPS (DoH). Before examining DoT and DoH, it’s important to take a quick look at DNS...

Zeek

Detecting GnuTLS CVE-2020-13777 using Zeek

Find a technical description of the bug, how it can be detected in network traffic, and how a short Zeek script can detect vulnerable servers.

Zeek

Analyzing encrypted RDP connections

Open source Zeek is capable of analyzing RDP connections and does a fantastic job handling the many options and configurations the RDP protocol...

Zeek

A network engineer in a Zeek Week world

I’m seven months into a new job here at Corelight as a product manager, and I’m still as excited about Zeek as I was last month about Zeek Week....

Industry

The sun sets on TLS 1.0

The major web browsers announced their intent to disable support for TLS 1.0 and TLS 1.1 in 2020. What does this mean, and what are the consequences?

Zeek

Profiling Whonix

I downloaded Whonix version 15, in which two virtual machines work together to detect activity in a clever way.