Acting on CISA’s advice for detecting Russian cyberattacks
This post explores the 4 key areas outlined in the CISA "Shields Up" memo and examines ways they can be detected with network data.
This post explores the 4 key areas outlined in the CISA "Shields Up" memo and examines ways they can be detected with network data.
OMB’s new memorandum M-22-09 is changing this pattern, and setting deadlines for implementation across the government.
Our new integration combines Corelight with the advanced vulnerability management, detection and response capabilities of Microsoft Defender for IoT.
As the first National Cyber Director settles into office, we are very hopeful this will be a turning point to solidify a true private/public...
I highlight sections of the EO that federal agencies should study closely and offer my thoughts, drawing from more than 30 years of cybersecurity...
Richard shared his thoughts on our blog on why the overarching role of the network and election infrastructure is worthy of a deep assessment right...
While I have used log collection and SIEM platforms to review Zeek transaction logs, it is not necessary to wait for a SIEM before collecting...
Chronicle launched Backstory, a new security analytics platform, and we are pleased to share that Corelight is part of the Chronicle Index Partner...
When Greg Bell became CEO of Corelight, I knew that this company had three fundamental ingredients for success that made it worth joining.