Zeek
Network Security Monitoring: Your best next move
Welcome to the first in a regular series of blog posts on network security monitoring (NSM). I look forward to you joining me on this journey.
Welcome to the first in a regular series of blog posts on network security monitoring (NSM). I look forward to you joining me on this journey.
Collecting and analyzing core NSM data types & with host-based security provide the best chance for CIRTs to detect and respond to the sorts of...
I am really fired up to join Corelight. Let me step backwards to help explain my present situation, and forecast the future.