Detections and Findings using Corelight in the Black Hat Asia NOC
Learn about detections and findings from the network operations center (NOC) at Black Hat Asia 2023.
Learn about detections and findings from the network operations center (NOC) at Black Hat Asia 2023.
Learn how to leverage Corelight evidence to detect and analyze activity related to Storm-0558.
Organizations often implement a data collection strategy out of fear, collecting everything “just in case.” I challenge the assumption.
The most sophisticated cyber defense teams in the world have shifted their strategies towards the collection and analysis of high-quality evidence.
Corelight just shipped our latest software release (v24) which includes a brand new addition to our Encrypted Traffic Collection: VPN Insights.
Prioritizing alerts just got a little easier for SOC teams with Corelight's integration with Tenable.
A growing number of defenders use two SIEMs. This post explores why and whether XDR platforms will evolve to to become full threat hunting solutions.
This post explores the 4 key areas outlined in the CISA "Shields Up" memo and examines ways they can be detected with network data.
OMB’s new memorandum M-22-09 is changing this pattern, and setting deadlines for implementation across the government.