Get Started

          Threat Hunting

          Monitoring networks for Chinese State-Sponsored Cyber Operations

          The US federal government recently took an unprecedented step in the fight against cyber espionage, publishing detailed technical guidance on tactics and techniques used by Chinese state-sponsored actors.  Read more »

          CrowdStrike + Corelight partner to reach new heights

          Through our newly announced partnership with CrowdStrike, Corelight customers will be able to incorporate CrowdStrike’s best-in-class threat intelligence into Corelight Sensors to generate actionable alerts and network evidence. In addition, by... Read more »

          Translating query into action

          One of the most important aspects of threat hunting is having a place to start. A question, a theory, or a hunch often begins the hunt. Where you end up may not be where you first intended, but a good hunt will always reveal new information about... Read more »

          12 talks to see at RSA 2020

          RSA 2020 is fast approaching, and a colleague asked what talks I planned to attend. As I am not attending RSA, I thought I would answer her question anyway, with the hopes that those participating in the conference might benefit from my review of... Read more »

          New Corelight app for Splunk: Making network-based threat hunting easier

          Want to use Zeek (formerly Bro) network data in Splunk ES, but don’t know how to start or where to look? Read more »

          Search

            Recent Posts