Monitoring. Why Bother?
In this post I will offer a few reasons why network owners have a responsibility to monitor, not just the option to monitor.
In this post I will offer a few reasons why network owners have a responsibility to monitor, not just the option to monitor.
Welcome to the first in a regular series of blog posts on network security monitoring (NSM). I look forward to you joining me on this journey.
I’m back in San Francisco after the last ever BroCon! Why the last BroCon? Because the Bro Leadership Team has announced a new name for the project.
With Corelight’s 1.15 release, we help figure out the host names associated with an IP address in prior network activity. Here's how it works.
Collecting and analyzing core NSM data types & with host-based security provide the best chance for CIRTs to detect and respond to the sorts of...
When Greg Bell became CEO of Corelight, I knew that this company had three fundamental ingredients for success that made it worth joining.
I am really fired up to join Corelight. Let me step backwards to help explain my present situation, and forecast the future.
In this blog post, find out how Corelight is making it easier to detect threats on your network, and provides even better data to respond to them.
I want to take the opportunity here to talk about a few of our more recent contributions to open-source Zeek (formerly Bro).