Corelight Investigator accelerates threat hunting
This morning we announced Corelight Investigator, an open NDR platform that enables security teams with next-level evidence. Here is how it works.
This morning we announced Corelight Investigator, an open NDR platform that enables security teams with next-level evidence. Here is how it works.
Learn about the attributes of high-quality evidence. What should evidence look like, in order to be useful to defenders when the next security event...
What do I say if my team discovers a breach of our digital assets? This is a question that requires understanding “defensible disclosure.”
Sniffing and mirroring network traffic from containers can be complicated. This post explores one approach to achieve this by injecting a sniffer...
Our new collaboration with CrowdStrike and Humio allows our customers and the community to experience the value of evidence.
This post explores the need, different approaches and pros and cons of monitor traffic in Kubernetes environments.
Application layer infrastructure visibility in IaaS using a recent Log4Shell example.
Here are four elements of the security strategy for the next Log4Shell.
What is the XDR paradox? It’s the hottest term in security but there is no consensus yet on the right definition. Why is that?