Extending NDR visibility in AWS IaaS
Visibility is challenging in a cloud environment. Security teams have long relied on network monitoring to complement application level visibility.
Visibility is challenging in a cloud environment. Security teams have long relied on network monitoring to complement application level visibility.
Are you looking to threat hunt but lack sufficient network and IDS data? Maximize your Splunk ES investment with Corelight.
In this blog post, we’ll look at some tips and tricks for how you can get more out of your Network Intrusion Detection Systems (NIDS).
Corelight is excited to announce the Corelight@Home program, bringing Corelight’s enterprise-class Network Detection and Response to home networks.
The past few weeks have seen several developments around Community ID and support for Wireshark. I’d like to summarize them in this blog post.
In this post I am going to walk you through the process I used to develop a package called “my_stats” that pulls memory information from a running...
This post contains a warning and a solution for anyone using BPF syntax when filtering traffic for network security monitoring.
This blog post explains three levels of analysis and how encryption has affected NSM, demonstrating that NSM remains relevant, despite encryption.
In this post, we’ll explore DNS over TLS (DoT) and DNS over HTTPS (DoH). Before examining DoT and DoH, it’s important to take a quick look at DNS...