Featured Inside the mind of a cybersecurity threat hunter part 3: hunting for adversaries moving inside your network Learn how to use Corelight’s rich network telemetry in CrowdStrike’s Next-Gen SIEM to expose defense evasion and lateral movement inside your network. Allen Marin Dec 22, 2025
Zeek Small, fast and easy. Pick any three. Zeek has been the darling of security defenders looking to get deep visibility into network traffic. Today, we are excited to announce the Software... Seth Hall Nov 18, 2020