Featured Inside the mind of a cybersecurity threat hunter part 3: hunting for adversaries moving inside your network Learn how to use Corelight’s rich network telemetry in CrowdStrike’s Next-Gen SIEM to expose defense evasion and lateral movement inside your network. Allen Marin Dec 22, 2025
Network Security Monitoring Thrown in the deep end: My first time hunting in the Black Hat NOC Step into the Black Hat NOC as I recount my first experience with real-time threat hunting. Matt Ellison Jan 28, 2025