Chocolate and peanut butter, Zeek and Suricata
We are proud to announce that in our v19 software release we have delivered a sensor that combines and integrates Zeek and Suricata with three key...
We are proud to announce that in our v19 software release we have delivered a sensor that combines and integrates Zeek and Suricata with three key...
We are excited to announce the expansion of our ETC. In this post, I will provide some further details and what the research team is working on next!
Find a technical description of the bug, how it can be detected in network traffic, and how a short Zeek script can detect vulnerable servers.
Richard shared his thoughts on our blog on why the overarching role of the network and election infrastructure is worthy of a deep assessment right...
Here's how to instrument and enable network security monitoring for a small office – home office (SOHO) environment.
Learn about the benefits of Corelight DNS logs, and how Splunk Enterprise Security can reach a new level of functionality through integration with...
Security teams would benefit from reviewing their NSM data to ensure that only authorized parties are interacting with their remote work...
Whether you’re a footsoldier or a tier-one analyst, a commanding view helps you outsmart and outlast adversaries. With Corelight, you can hold the...
RSA 2020 is fast approaching. The speaker sessions seem to be of high quality overall, but here are the 12 talks you should consider attending.