Featured Inside the mind of a cybersecurity threat hunter part 3: hunting for adversaries moving inside your network Learn how to use Corelight’s rich network telemetry in CrowdStrike’s Next-Gen SIEM to expose defense evasion and lateral movement inside your network. Allen Marin Dec 22, 2025
Corelight Your network evidence, your SIEM, your way: Corelight’s open SIEM strategy empowers SOCs with a unified experience Bring high-fidelity network evidence to any SIEM—without compromise. Ricky Lin Apr 25, 2025
network security Application Layer Infrastructure Visibility in IaaS Application layer infrastructure visibility in IaaS using a recent Log4Shell example. Ricky Lin Feb 10, 2022