The Elephant in the SIEM War Room
We look at the main angles of innovation that are playing out across form factors (on-prem, MSSP, and SaaS) and the elephant in the room that goes...
We look at the main angles of innovation that are playing out across form factors (on-prem, MSSP, and SaaS) and the elephant in the room that goes...
Today, we are happy to share some industry recognition and a few awards that are now under our belt.
Now that our largest customers are approaching hundreds of deployed sensors, our mission is broadening. It has led us to develop Corelight Fleet...
In this post I will use Zeek logs to demonstrate alternative ways to analyze encrypted HTTP traffic.
This post covers a brief history of encryption on the web and investigates the security analysis challenges that have developed as a result.
In this post I will offer a few reasons why network owners have a responsibility to monitor, not just the option to monitor.
Welcome to the first in a regular series of blog posts on network security monitoring (NSM). I look forward to you joining me on this journey.
I’m back in San Francisco after the last ever BroCon! Why the last BroCon? Because the Bro Leadership Team has announced a new name for the project.
With Corelight’s 1.15 release, we help figure out the host names associated with an IP address in prior network activity. Here's how it works.