Data driven detection: Corelight’s approach to AI-powered NDR
Learn how Corelight combines Zeek data, ML, and GenAI workflows to fuel threat hunting, accelerate incident response, and disrupt advanced network...
Learn how Corelight combines Zeek data, ML, and GenAI workflows to fuel threat hunting, accelerate incident response, and disrupt advanced network...
CISA is trying to shake us all into action, but you have to go hunting for themes. Let's connect some dots across this year's advisories.
Our Series E funding is an endorsement of both our strategy and opportunity.
The most sophisticated cyber defense teams in the world have shifted their strategies towards the collection and analysis of high-quality evidence.
A growing number of defenders use two SIEMs. This post explores why and whether XDR platforms will evolve to to become full threat hunting solutions.
Here are four elements of the security strategy for the next Log4Shell.
What is the XDR paradox? It’s the hottest term in security but there is no consensus yet on the right definition. Why is that?
We are proud to announce that in our v19 software release we have delivered a sensor that combines and integrates Zeek and Suricata with three key...
We look at the main angles of innovation that are playing out across form factors (on-prem, MSSP, and SaaS) and the elephant in the room that goes...