Countering network resident threats
Anyone worrying about detecting and responding to network resident threats would benefit from the data that Corelight provides.
Anyone worrying about detecting and responding to network resident threats would benefit from the data that Corelight provides.
Here's how the new Corelight app for Splunk makes network-based threat hunting easier.
While I have used log collection and SIEM platforms to review Zeek transaction logs, it is not necessary to wait for a SIEM before collecting...
Corelight just released our v17 software. Here are the details about how these new features can enhance your data, speed up your IR workflow, and...
We look at the main angles of innovation that are playing out across form factors (on-prem, MSSP, and SaaS) and the elephant in the room that goes...
Now that our largest customers are approaching hundreds of deployed sensors, our mission is broadening. It has led us to develop Corelight Fleet...
With Corelight’s 1.15 release, we help figure out the host names associated with an IP address in prior network activity. Here's how it works.
Here's why Databricks plus Corelight is a powerful combination for cybersecurity, incident response and threat hunting.
Discover how Zeek (formerly Bro) logs gave one company better DNS traffic visibility than their DNS servers.