Log enrichment with DNS host names
With Corelight’s 1.15 release, we help figure out the host names associated with an IP address in prior network activity. Here's how it works.
With Corelight’s 1.15 release, we help figure out the host names associated with an IP address in prior network activity. Here's how it works.
Collecting and analyzing core NSM data types & with host-based security provide the best chance for CIRTs to detect and respond to the sorts of...
When Greg Bell became CEO of Corelight, I knew that this company had three fundamental ingredients for success that made it worth joining.
I am really fired up to join Corelight. Let me step backwards to help explain my present situation, and forecast the future.
In this blog post, find out how Corelight is making it easier to detect threats on your network, and provides even better data to respond to them.
I want to take the opportunity here to talk about a few of our more recent contributions to open-source Zeek (formerly Bro).
Here's why Databricks plus Corelight is a powerful combination for cybersecurity, incident response and threat hunting.
Discover how Zeek (formerly Bro) logs gave one company better DNS traffic visibility than their DNS servers.
Bro’s SMB protocol analyzer has undergone several iterations, and it is now a built-in feature that many Bro users might have overlooked.