Featured Inside the mind of a cybersecurity threat hunter part 3: hunting for adversaries moving inside your network Learn how to use Corelight’s rich network telemetry in CrowdStrike’s Next-Gen SIEM to expose defense evasion and lateral movement inside your network. Allen Marin Dec 22, 2025
Zeek Extensibility as a Guiding Principle To us, extensibility is not an afterthought that we try to tuck on in a few release cycles. It permeates the way we think about network monitoring. Christian Kreibich Dec 6, 2017