A few notes from a CISA anger translator
CISA is trying to shake us all into action, but you have to go hunting for themes. Let's connect some dots across this year's advisories.
CISA is trying to shake us all into action, but you have to go hunting for themes. Let's connect some dots across this year's advisories.
A growing number of defenders use two SIEMs. This post explores why and whether XDR platforms will evolve to to become full threat hunting solutions.
This new feature empowers SOC analysts to isolate a host directly from Corelight Investigator.
Learn how Zeek’s metadata approach can help focus patching efforts for the SSH “Terrapin” attack.
See how we used Corelight's Open NDR platform to take an evidence-based security approach at Blackhat Europe 2023.
Learn how Zeek’s metadata approach can help focus patching efforts for the SSH “Terrapin” attack.
Learn why adding Corelight to your cybersecurity arsenal, alongside existing NGFWs, is a strategic necessity.
Learn how threat hunters can identify MITRE ATT&CK persistence techniques.
Learn about detections and findings from the network operations center (NOC) at Black Hat Asia 2023.