Featured Inside the mind of a cybersecurity threat hunter part 3: hunting for adversaries moving inside your network Learn how to use Corelight’s rich network telemetry in CrowdStrike’s Next-Gen SIEM to expose defense evasion and lateral movement inside your network. Allen Marin Dec 22, 2025
Zeek Is there a ‘Z’ in “Vectra”? This blog builds on a prior post by discussing why our customers come to us as an enterprise solution to support their Zeek deployments. Vern Paxson May 21, 2019