Carrefour Enhances Cybersecurity With Corelight
A growing number of defenders use two SIEMs. This post explores why and whether XDR platforms will evolve to to become full threat hunting solutions.
A growing number of defenders use two SIEMs. This post explores why and whether XDR platforms will evolve to to become full threat hunting solutions.
Learn how to use Zeek to easily detect malicious use of NetSupport Manager.
With the rapid adoption of Secure Access Service Edge (SASE) and Security Service Edge (SSE) solutions, maintaining comprehensive visibility becomes...
CISA is trying to shake us all into action, but you have to go hunting for themes. Let's connect some dots across this year's advisories.
A growing number of defenders use two SIEMs. This post explores why and whether XDR platforms will evolve to to become full threat hunting solutions.
This new feature empowers SOC analysts to isolate a host directly from Corelight Investigator.
Learn how Zeek’s metadata approach can help focus patching efforts for the SSH “Terrapin” attack.
See how we used Corelight's Open NDR platform to take an evidence-based security approach at Blackhat Europe 2023.
Learn how Zeek’s metadata approach can help focus patching efforts for the SSH “Terrapin” attack.