Detecting Storm-0558 using Corelight evidence
Learn how to leverage Corelight evidence to detect and analyze activity related to Storm-0558.
Learn how to leverage Corelight evidence to detect and analyze activity related to Storm-0558.
Organizations often implement a data collection strategy out of fear, collecting everything “just in case.” I challenge the assumption.
The most sophisticated cyber defense teams in the world have shifted their strategies towards the collection and analysis of high-quality evidence.
Corelight just shipped our latest software release (v24) which includes a brand new addition to our Encrypted Traffic Collection: VPN Insights.
Prioritizing alerts just got a little easier for SOC teams with Corelight's integration with Tenable.
A growing number of defenders use two SIEMs. This post explores why and whether XDR platforms will evolve to to become full threat hunting solutions.
This post explores the 4 key areas outlined in the CISA "Shields Up" memo and examines ways they can be detected with network data.
OMB’s new memorandum M-22-09 is changing this pattern, and setting deadlines for implementation across the government.
Our new integration combines Corelight with the advanced vulnerability management, detection and response capabilities of Microsoft Defender for IoT.