VPNs are increasingly common - how much can you see?
Corelight just shipped our latest software release (v24) which includes a brand new addition to our Encrypted Traffic Collection: VPN Insights.
Corelight just shipped our latest software release (v24) which includes a brand new addition to our Encrypted Traffic Collection: VPN Insights.
Prioritizing alerts just got a little easier for SOC teams with Corelight's integration with Tenable.
A growing number of defenders use two SIEMs. This post explores why and whether XDR platforms will evolve to to become full threat hunting solutions.
This post explores the 4 key areas outlined in the CISA "Shields Up" memo and examines ways they can be detected with network data.
Application layer infrastructure visibility in IaaS using a recent Log4Shell example.
OMB’s new memorandum M-22-09 is changing this pattern, and setting deadlines for implementation across the government.
This blog presents an open source detection method that Corelight Labs is releasing to detect exploit attempts of CVE-2022-21907.
Here are four elements of the security strategy for the next Log4Shell.
The blog covers a third log4j detection method, this one focused on the second-stage download that happens after the first stage completes.