Network security monitoring is dead, and encryption killed it.
This post covers a brief history of encryption on the web and investigates the security analysis challenges that have developed as a result.
This post covers a brief history of encryption on the web and investigates the security analysis challenges that have developed as a result.
In this post I will offer a few reasons why network owners have a responsibility to monitor, not just the option to monitor.
Welcome to the first in a regular series of blog posts on network security monitoring (NSM). I look forward to you joining me on this journey.
Collecting and analyzing core NSM data types & with host-based security provide the best chance for CIRTs to detect and respond to the sorts of...
I am really fired up to join Corelight. Let me step backwards to help explain my present situation, and forecast the future.