Leveraging map-reduce and LLMs for enhanced cybersecurity network detection
Learn how Map-Reduce and LLMs can be used to efficiently analyze huge datasets and improve threat hunting, incident response, and forensic analysis.
Learn how Map-Reduce and LLMs can be used to efficiently analyze huge datasets and improve threat hunting, incident response, and forensic analysis.
Learn how metadata enables efficient, cost-effective compliance with FINRA's data archiving requirements while improving network security.
Learn how Corelight and Zeek streamline financial protocol tracking, improve network security, and simplify compliance.
SCinet’s massive, open network creates unique security challenges. Here's a recap of my experience threat hunting in this high-speed environment.
Learn how to run DeepSeek AI locally with Ollama and Open WebUI for secure Zeek script analysis.
Corelight's data aggregation reduces SIEM ingest by 50-80% compared to legacy network security monitoring tools.
Read how to identify C2 activities and agent downloads associated with MITRE Caldera agents using this Zeek Caldera detector via GitHub.
Learn how robust network security monitoring, like Corelight’s Open NDR, can help you gain comprehensive visibility into Kubernetes clusters.
Step into the Black Hat NOC as I recount my first experience with real-time threat hunting.