Want better network visibility? Don't just go with the (net)flow
Learn how Corelight logs provide deep network visibility for incident response and threat hunting in the Black Hat NOC.
Learn how Corelight logs provide deep network visibility for incident response and threat hunting in the Black Hat NOC.
On 1-14-2020, the world learned of the vulnerability CVE-2020-0601. This post is about how leveraging the power of the Zeek community can benefit...
Learn about the four NSM data types and the four core functions which one can perform with a passive network visibility platform.
Here's why Databricks plus Corelight is a powerful combination for cybersecurity, incident response and threat hunting.
I’ve enjoyed meeting many companies and leaders in the Bay Area. The best was with Corelight (where I recently joined as their chief product officer).