Astronomers and Chemists
Now that our largest customers are approaching hundreds of deployed sensors, our mission is broadening. It has led us to develop Corelight Fleet...
Now that our largest customers are approaching hundreds of deployed sensors, our mission is broadening. It has led us to develop Corelight Fleet...
In this post I will use Zeek logs to demonstrate alternative ways to analyze encrypted HTTP traffic.
This post covers a brief history of encryption on the web and investigates the security analysis challenges that have developed as a result.
In this post I will offer a few reasons why network owners have a responsibility to monitor, not just the option to monitor.
Welcome to the first in a regular series of blog posts on network security monitoring (NSM). I look forward to you joining me on this journey.
I’m back in San Francisco after the last ever BroCon! Why the last BroCon? Because the Bro Leadership Team has announced a new name for the project.
With Corelight’s 1.15 release, we help figure out the host names associated with an IP address in prior network activity. Here's how it works.
Collecting and analyzing core NSM data types & with host-based security provide the best chance for CIRTs to detect and respond to the sorts of...
When Greg Bell became CEO of Corelight, I knew that this company had three fundamental ingredients for success that made it worth joining.