Featured Inside the mind of a cybersecurity threat hunter part 3: hunting for adversaries moving inside your network Learn how to use Corelight’s rich network telemetry in CrowdStrike’s Next-Gen SIEM to expose defense evasion and lateral movement inside your network. Allen Marin Dec 22, 2025
Zeek Chocolate and peanut butter, Zeek and Suricata We are proud to announce that in our v19 software release we have delivered a sensor that combines and integrates Zeek and Suricata with three key... Brian Dye Jun 16, 2020