Inside the Mind of a Cybersecurity Threat Hunter Part 2: Identifying Persistence Techniques
Learn how threat hunters can identify MITRE ATT&CK persistence techniques.
Learn how threat hunters can identify MITRE ATT&CK persistence techniques.
Learn how the kill web concept can be applied to cybersecurity, and how it addresses some of the concerns with the kill chain.
Learn how Corelight’s integration with CrowdStrike helps threat hunters detect signs of Initial Access, one of the tactics and techniques outlined in...
Learn how Corelight is using AI in its NDR products to help SOC teams be even more productive.
Here are my learnings from participating in NOCs at Black Hat Asia and Black Hat Las Vegas in 2023.
Learn how the kill web concept can be applied to cybersecurity, and how it addresses some of the concerns with the kill chain.
Here are five lessons that me and my NOC teammates learned over the course of our week together at Black Hat NOC USA 2023.
Download the Corelight App for Splunk and see how easy it is to get Corelight data into Splunk.
Black Hat Asia 2023 NOC: Lessons in Deploying Corelight