Featured Inside the mind of a cybersecurity threat hunter part 3: hunting for adversaries moving inside your network Learn how to use Corelight’s rich network telemetry in CrowdStrike’s Next-Gen SIEM to expose defense evasion and lateral movement inside your network. Allen Marin Dec 22, 2025
Zeek Using Corelight and Zeek to support remote workers Security teams would benefit from reviewing their NSM data to ensure that only authorized parties are interacting with their remote work... Richard Bejtlich Mar 25, 2020