Featured Inside the mind of a cybersecurity threat hunter part 3: hunting for adversaries moving inside your network Learn how to use Corelight’s rich network telemetry in CrowdStrike’s Next-Gen SIEM to expose defense evasion and lateral movement inside your network. Allen Marin Dec 22, 2025
Zeek Network Security Monitoring: Your best next move Welcome to the first in a regular series of blog posts on network security monitoring (NSM). I look forward to you joining me on this journey. Richard Bejtlich Dec 11, 2018