Featured Modernize threat detection and SOC efficiency with integrated Corelight Threat Intelligence Enhanced anomaly detection and east-west visibility improve evasive threat detection, reduce false positives, and help SOC teams focus on critical... Allen Marin Oct 30, 2025
Zeek Examining aspects of encrypted traffic through Zeek logs In this post I will use Zeek logs to demonstrate alternative ways to analyze encrypted HTTP traffic. Richard Bejtlich Feb 19, 2019