How Corelight Uses AI to Empower SOC Teams
Learn how Corelight is using AI in its NDR products to help SOC teams be even more productive.
Learn how Corelight is using AI in its NDR products to help SOC teams be even more productive.
Learn how the kill web concept can be applied to cybersecurity, and how it addresses some of the concerns with the kill chain.
Take a look at an incident we detected, investigated, triaged, and closed using Corelight at Black Hat Las Vegas 2023.
This article proposes ways that modern network-derived evidence applies to the kill chain.
Learn how to leverage Corelight evidence to detect and analyze activity related to Storm-0558.
Black Hat Asia 2023 NOC: Lessons in Deploying Corelight
Corelight Entity Collection, now available in v26 software release, features 3 new packages: Known Entities, Application Identification and Local...
Corelight v27 software release enhances the platform’s integrated Suricata IDS functionality, further integrating alerts with rich context.
We recently discussed some methods for detecting the Log4j exploit, and we’ve developed another method that one running Zeek® or a Corelight sensor...