Dual Defenses: 9 Reasons Why Open NDR Is Essential Alongside NGFW
Learn why adding Corelight to your cybersecurity arsenal, alongside existing NGFWs, is a strategic necessity.
Learn why adding Corelight to your cybersecurity arsenal, alongside existing NGFWs, is a strategic necessity.
Learn how threat hunters can identify MITRE ATT&CK persistence techniques.
Learn how Corelight’s integration with CrowdStrike helps threat hunters detect signs of Initial Access, one of the tactics and techniques outlined in...
Announcing the Corelight Cloud Sensor, deployable in AWS and capable of ingesting traffic directly from the new Amazon VPC traffic mirroring feature.
Here's why Databricks plus Corelight is a powerful combination for cybersecurity, incident response and threat hunting.
Discover how Zeek (formerly Bro) logs gave one company better DNS traffic visibility than their DNS servers.
Bro’s SMB protocol analyzer has undergone several iterations, and it is now a built-in feature that many Bro users might have overlooked.
I’ve enjoyed meeting many companies and leaders in the Bay Area. The best was with Corelight (where I recently joined as their chief product officer).