Featured Inside the mind of a cybersecurity threat hunter part 3: hunting for adversaries moving inside your network Learn how to use Corelight’s rich network telemetry in CrowdStrike’s Next-Gen SIEM to expose defense evasion and lateral movement inside your network. Allen Marin Dec 22, 2025
cybersecurity Acting on CISA’s advice for detecting Russian cyberattacks This post explores the 4 key areas outlined in the CISA "Shields Up" memo and examines ways they can be detected with network data. Alex Kirk Feb 28, 2022