Featured Inside the mind of a cybersecurity threat hunter part 3: hunting for adversaries moving inside your network Learn how to use Corelight’s rich network telemetry in CrowdStrike’s Next-Gen SIEM to expose defense evasion and lateral movement inside your network. Allen Marin Dec 22, 2025
Zeek Zeek is much more than a data format Last week, a candidate for a role at Corelight explained his motivation for joining the company: “the world is standardizing on Zeek.” Here's why... Gregory Bell Apr 24, 2019