The evidence bank: leveraging security's most valuable asset
Organizations often implement a data collection strategy out of fear, collecting everything “just in case.” I challenge the assumption.
Organizations often implement a data collection strategy out of fear, collecting everything “just in case.” I challenge the assumption.
A growing number of defenders use two SIEMs. This post explores why and whether XDR platforms will evolve to to become full threat hunting solutions.
The CrowdStrike + Corelight partnership lets customers incorporate threat intelligence into Corelight Sensors to generate alerts and network evidence.
This blog builds on a prior post by discussing why our customers come to us as an enterprise solution to support their Zeek deployments.