CONTACT US
forrester wave report 2023

Forrester rates Corelight a strong performer

GET THE REPORT

ad-nav-crowdstrike

Corelight now powers CrowdStrike solutions and services

READ MORE

ad-images-nav_0013_IDS

Alerts, meet evidence.

LEARN MORE ABOUT OUR IDS SOLUTION

ad-images-nav_white-paper

5 Ways Corelight Data Helps Investigators Win

READ WHITE PAPER

glossary-icon

10 Considerations for Implementing an XDR Strategy

READ NOW

ad-images-nav_0006_Blog

Don't trust. Verify with evidence

READ BLOG

ad-nav-NDR-for-dummies

NDR for Dummies

GET THE WHITE PAPER

video

The Power of Open-Source Tools for Network Detection and Response

WATCH THE WEBCAST

ad-nav-ESG

The Evolving Role of NDR

DOWNLOAD THE REPORT

ad-images-nav_0006_Blog

Detecting 5 Current APTs without heavy lifting

READ BLOG

g2-medal-best-support-ndr-winter-2024

Network Detection and Response

SUPPORT OVERVIEW

 

News Coverage

The 20 Coolest Network Security Companies Of 2024: The Security 100

ig-arrow-blue

The Importance of Disruption – How to Add Resilience to Today’s Security Model

ig-arrow-blue

Council Post: What I've Learned About Cybersecurity From The Ocean

ig-arrow-blue

200+ Alarming Cybersecurity Stats & Insights from Security Experts

ig-arrow-blue

Google Cloud Introduces Security AI Workbench, Combines Mandiant Threat Intelligence

ig-arrow-blue

Corelight's Jean Schaffer emphasizes securing entire infrastructure before moving to threat-hunting phase

ig-arrow-blue

Risky Business #703 -- Russia whines about its tech dependence on China

ig-arrow-blue

Google Cloud Announces New Security AI Workbench and Ecosystem Expansion at RSAC 2023

ig-arrow-blue

Corelight to Expand AI Usage Across Portfolio, Including Industry Leading GPT-Driven Integrations

ig-arrow-blue

Corelight expands AI usage across its portfolio to boost SOC efficacy

ig-arrow-blue

Daggerfly swarms African telco. EvilExtractor described. Patriotic hacktivism in East Asia. Updates on Russia's hybrid war.

ig-arrow-blue

Endpoint Security and Network Monitoring News for the Week of April 21; Lookout, IRONSCALES, Lumu, and More

ig-arrow-blue

Cybersecurity Alignment: Best Practices and Why It Matters to Enterprises

ig-arrow-blue

2023 Partner Program Guide: 5-Star Security Vendor Programs

ig-arrow-blue

2023 Partner Program Guide

ig-arrow-blue

Corelight Pursues IR Partnerships, Smaller Enterprise Deals

ig-arrow-blue

Meet the 10 most active VC cybersecurity investors

ig-arrow-blue

Normalyze Granted Patent for Data Security Posture Management (DSPM)

ig-arrow-blue

Turning the Tables on the Network Intruder

ig-arrow-blue

What is Network Detection and Response (NDR)? Ultimate Guide

ig-arrow-blue

HowTo: Accelerate Detection and Response in the Cloud

ig-arrow-blue

The 20 Coolest Network Security Companies Of 2023: The Security 100

ig-arrow-blue

Zscaler acquiring Canonic Security. Sandbox AQ raises $500 million in funding. Labor markets.

ig-arrow-blue

Managed Security Services Provider (MSSP) Market News: 9 February 2023

ig-arrow-blue

An update on ESXiArgs. Criminal recon. Cyberespionage: from phishing to war floating.

ig-arrow-blue

Managed Security Services Provider (MSSP) Market News: 8 February 2023

ig-arrow-blue

Corelight Expands Partnership With CrowdStrike to Provide Network Detection and Response Technology for CrowdStrike Services

ig-arrow-blue

How Berkeley Lab Helped Develop One of the World's Most Popular Open-Source Security Monitoring Platforms

ig-arrow-blue

Tenable's $25M Venture Capital Fund Seeks Early-Stage Firms

ig-arrow-blue

Why enterprises need a complete data strategy [Q&A]

ig-arrow-blue

MIT Taxonomy Helps Build Explainability Into the Components of Machine-Learning Models

ig-arrow-blue

Key Takeaways: 2022 Gartner Market Guide for Network Detection and Response (NDR)

ig-arrow-blue

Best 50 Blogs to Follow to Learn Cyber Security in 2023

ig-arrow-blue

Headcount: Firings, Hirings, and Retirings — November 2022

ig-arrow-blue

Turning Data into Evidence to Accelerate SecOps Success

ig-arrow-blue

Daily Briefing 12.1.2022

ig-arrow-blue

31 CISOs share their security priorities and predictions for 2023

ig-arrow-blue

Microsoft Defender Gets New Security Protections

ig-arrow-blue

The Key to a Strong Cyber Defense: Turning Data into Evidence

ig-arrow-blue

Week in review: High-severity OpenSSL vulnerabilities fixed, Patch Tuesday forecast

ig-arrow-blue

Daily Briefing 11/2/22

ig-arrow-blue

Business Briefing 11/2/22

ig-arrow-blue

Daily Briefing 11/1/2022

ig-arrow-blue

Infosec products of the month: October 2022

ig-arrow-blue

Container Security: why so different?

ig-arrow-blue

Decipher podcast: Kelley Misata

ig-arrow-blue

Security Review Magazine: Corelight launches Investigator for the MEA region with Spire Solutions

ig-arrow-blue

Cyber Security News: 6 best free malware analysis tools to break down the malware samples

ig-arrow-blue

HelpNet Security: New infosec products of the week: Oct. 21 2022

ig-arrow-blue

ExecutiveGov: Corelight's Federal CTO, Jean Schaffer, talks improving Federal acquisition processes

ig-arrow-blue

HelpNet Security: Corelight Cloud Sensor SaaS for AWS accelerates incident response for security teams

ig-arrow-blue

MSSP Alert: Network Detection and Response (NDR) for AWS

ig-arrow-blue

VMBlog: Corelight unveils Cloud Sensor SaaS for AWS to help SOCs turn cloud traffic into comprehensive correlated evidence

ig-arrow-blue

Yahoo Finance: Corelight unveils Cloud Sensor SaaS for AWS to help SOCs turn cloud traffic into comprehensive correlated evidence

ig-arrow-blue

Potomac Officers Club: Executive Spotlight: Jean Schaffer, Federal CTO at Corelight

ig-arrow-blue

The Cyberwire: Corelight appoints Dr. Kelley Misata to lead open source strategy

ig-arrow-blue

VMBlog: Zeek is now a component of Microsoft Windows

ig-arrow-blue

The Cyberwire: Detecting the Manjusaka C2 framework

ig-arrow-blue

Risky Business Episode #677: A day late and a dollar short: China doxxes NSA op

ig-arrow-blue

EnterpriseSecurityTech: Bernard Brantley, Corelight Shares the importance of embracing an evidence-based security strategy

ig-arrow-blue

eSecurity Planet: Top Network Detection & Response (NDR) solutions

ig-arrow-blue

EnterpriseSecurityTech:/2022 Tech Ascension Awards recognize the Most Innovative Cybersecurity Companies

ig-arrow-blue

HelpNet Security: How organizations can implement a complete data strategy

ig-arrow-blue

FedScoop: Startups press Congress to improve how DOD buys software

ig-arrow-blue

BankInfoSecurity: Zero Trust: The nitty-gritty details

ig-arrow-blue

BankInfoSecurity: Harnessing the power of open source to protect networks

ig-arrow-blue

SF Business Times: Outstanding Voices/2022: Michele Bettencourt

ig-arrow-blue

HelpNet Security: Corelight Investigator allows security teams to accelerate their threat hunting and investigations

ig-arrow-blue

Teiss: New platform delivers open-source-powered network evidence

ig-arrow-blue

Dark Reading: Corelight announces new SaaS platform for threat hunting

ig-arrow-blue

VMblog: Corelight announces new platform

ig-arrow-blue

Teiss: Why cyber teams should always verify with evidence

ig-arrow-blue

MeriTalk: Celebrate the/2022 Cyber Defenders award winners

ig-arrow-blue

Intelligent CISO: Go phish: Bernard Brantley at Corelight

ig-arrow-blue

Risky Business: Episode #661: Viasat hack details firm up

ig-arrow-blue

CRN:/2022 Partner program guide: 5-star security vendor

ig-arrow-blue

GCN: Using the Sherlock Holmes method for cyber defense

ig-arrow-blue

Data Center Knowledge: Network Encryption: A double-edged sword for cybersecurity

ig-arrow-blue

Wall Street Journal: The Russia-Ukraine cyberwar could outlast the shooting war

ig-arrow-blue

IDG Connect: The Secret CSO: Bernard Brantley, Corelight

ig-arrow-blue

HelpNet Security: Are separate SIEMs for threat hunting a good idea?

ig-arrow-blue

CRN: The Security 100

ig-arrow-blue

CRN: CRN Channel Chiefs, Rick Beattie, Corelight

ig-arrow-blue

ITProPortal: Why understanding your data is the key to a successful cybersecurity strategy

ig-arrow-blue

FedScoop Radio: The Daily Scoop Podcast: Jean Schaffer federal chief technology officer at Corelight

ig-arrow-blue

HelpNet Security: Extracting value from the interconnected network of risk management

ig-arrow-blue

Solutions Review: 32 experts share advice on information security in/2022

ig-arrow-blue

FinanceBuzz: 9 women investors crushing it in 2021

ig-arrow-blue

Risky Business: Episode #644: USA sanctions NSO Group hits Revil

ig-arrow-blue

GreenBiz: Climate tech needs cybersecurity

ig-arrow-blue

Dark Reading: Corelight unveils Corelight Labs a hub for research and innovation

ig-arrow-blue

Network Computing: Packet capture: What if less is more?

ig-arrow-blue

SecurityWeekly: Episode #242: Corelight secures $75 million in series D funding

ig-arrow-blue

IDG Connect: C-suite career advice: Brian Dye Corelight

ig-arrow-blue

MSSP Alert: Talent – Network Detection and Response

ig-arrow-blue

Solutions Review: Corelight secures $75 million in series D funding

ig-arrow-blue

Pitchbook: Corelight lands $75M for cybersecurity platform

ig-arrow-blue

ExecutiveBiz: Network security company Corelight raises $75M in series D financing round

ig-arrow-blue

LA TechWatch: The weekly notable Startup funding report: 9/6/21

ig-arrow-blue

AITHORITY: H.I.G. Growth Partners invests in Corelight's $75M series D financing

ig-arrow-blue

Silicon Valley Business Journal: The Funded: Companies in SPAC mergers have dropped in value by billions

ig-arrow-blue

Business Leader: Corelight secures $75m Series D funding to support growth plans

ig-arrow-blue

SaaS Industry: Corelight raises $75M in a Series D round led by Energy Impact Partners

ig-arrow-blue

TechCrunch: Corelight secures $75M series d to bolster its network defense offering

ig-arrow-blue

Yahoo! Finance: Corelight secures $75M series D to bolster its network defense offering

ig-arrow-blue

Crunchbase News: Corelight lands $75m

ig-arrow-blue

CRN UK: Corelight targeting EMEA channel growth following $75m funding round

ig-arrow-blue

SecurityWeek: Corelight banks $75M for network monitoring expansion plans

ig-arrow-blue

SF Business Times: Corelight raised $75M in series D funding

ig-arrow-blue

SiliconANGLE: Corelight secures $75M to detect hacking attempts with open-source technology

ig-arrow-blue

VC News Daily: Corelight Pulls In $75M Series D Round

ig-arrow-blue

Dark Reading: Corelight secures $75 million in Series D Funding led by Energy Impact Partners

ig-arrow-blue

SC Magazine: The power of time in cybersecurity investigations

ig-arrow-blue

SecurityWeekly: Episode #237: Corelight Smart PCAPs

ig-arrow-blue

CRN: The 20 hottest cybersecurity products at Black Hat/2021

ig-arrow-blue

MSSP Alert: Black Hat/2021 live blog: MDR, XDR and MSSP updates

ig-arrow-blue

The Cyberwire: Corelight introduces Smart PCAP

ig-arrow-blue

O'Dwyer's: On the Move

ig-arrow-blue

Dark Reading: Cybersecurity through the lens of COVID

ig-arrow-blue

CTOVision: CTOs: Please help keep the government from wasting money help them learn to buy instead of build their software

ig-arrow-blue

ChannelVision: Secureworks unveils Technology Alliance Partner program to protect from advanced cyber threats

ig-arrow-blue

MSSP Alert: Secureworks launches XDR Technology Alliance Partner program

ig-arrow-blue

MeriTalk: Industry advises on security implications for IPv6 transition

ig-arrow-blue

VMBlog: Corelight Introduces Command and Control Collection for Targeted Insights and Detections

ig-arrow-blue

The CyberWire: Corelight Introduces Command and Control Collection for Targeted Insights And Detections

ig-arrow-blue

SC Magazine: H&R Block seeks out open-source expertise for SOC

ig-arrow-blue

IT Security Wire: CrowdStrike Security Cloud Integrates With Network Detection And Response Solutions For Comprehensive Platform Responses To Threats

ig-arrow-blue

TechRepublic: How the open source community helped firms investigate their network activity following SolarWinds

ig-arrow-blue

Intelligence Community News: Jean Schaffer joins Corelight as federal CTO

ig-arrow-blue

GovConWire: Intell community vet Jean Schaffer named CTO of Corelight's Federal arm

ig-arrow-blue

The Cyberwire: Former Defense Intelligence Agency CISO joins Corelight as Federal CTO

ig-arrow-blue

SecurityWeek: All eyes on PCAP: The gold standard of traffic analysis

ig-arrow-blue

The Cyberwire: Greg Bell: Answers the question of "why?" [open source]

ig-arrow-blue

CSO: New US CISO appointments

ig-arrow-blue

SIGNAL magazine: Flexible consistency improves information security

ig-arrow-blue

CRN: Corelight: 5-star partner program

ig-arrow-blue

MSSP Alert: Partnership – Network Detection and Response (NDR)

ig-arrow-blue

Journal of Cyber Policy: New takes on the Solar Winds hack(s)

ig-arrow-blue

National Defense: Nothing seems to stop relentless hackers exfiltrating trade secrets

ig-arrow-blue

Turn the Lens with Jeff Frick: Interview with Michele Bettencourt

ig-arrow-blue

NPR: Why Russia 05/have stepped up its hacking game

ig-arrow-blue

Dark Reading: A security practitioner's guide to encrypted DNS

ig-arrow-blue

FCW: CISA: SolarWinds' Orion 05/not be only entry point for hackers

ig-arrow-blue

The World from PRX: US cybersecurity firm is victim of cyber hack by foreign state

ig-arrow-blue

WIRED: Russia's FireEye Hack Is a Statement—but Not a Catastrophe

ig-arrow-blue

TechBeacon: Do security like a boss

ig-arrow-blue

DarkReading: From FUD to fix

ig-arrow-blue

Enterprise Security Tech: Corelight Appoints Seasoned Sales Executive to Accelerate Growth Across the Americas

ig-arrow-blue

The Cyberwire: Products services and solutions

ig-arrow-blue

Enterprise Security Tech: Corelight extends Open NDR platform

ig-arrow-blue

AiTHORITY: Corelight extends Open NDR platform

ig-arrow-blue

Journal of Cyber Policy: Corelight extends Open NDR platform

ig-arrow-blue

VMBlog: Corelight extends Open NDR platform

ig-arrow-blue

C4ISRNET: A three-step cybersecurity plan for the modern military

ig-arrow-blue

Toolbox: Encrypted traffic is a backdoor for malware - defend your networks now

ig-arrow-blue

Dark Reading: Encrypted Traffic Inference: An Alternative to Enterprise Network Traffic Decryption

ig-arrow-blue

Reuters: From Wall Street to Silicon Valley LGBT+ investment on the rise

ig-arrow-blue

TechBeacon: Is an open-source SOC right for your organization?

ig-arrow-blue

SF Business Times: Corelight names former McAfee executive Brian Dye as CEO

ig-arrow-blue

StateScoop: Why North Carolina outsourced election cybersecurity to a 'CISO-as-a-service'

ig-arrow-blue

Federal News Network: How enhanced network visibility enables federal agencies to ‘defend the house'

ig-arrow-blue

ComputerWeekly: Channel roundup: Who's gone where?

ig-arrow-blue

Arabian Reseller: Corelight Welcomes Two New Executives to Lead EMEA Sales and Channel

ig-arrow-blue

The Daily Swig: Cat and mouse: Privacy advocates fight back after China tightens surveillance controls

ig-arrow-blue

CSO: 18 (new) ways attackers can compromise email

ig-arrow-blue

InfoSecurity: #BHUSA: Researchers Reveal Attacks Against Email Sender Authentication

ig-arrow-blue

SecurityGuyTV: Episode 1690: Open Network Detection and Response Platform

ig-arrow-blue

WIRED: Decades-Old Email Flaws Could Let Attackers Mask Their Identities

ig-arrow-blue

GCN: 3 questions to answer before implementing SOAR

ig-arrow-blue

ITNews: Open source F5 Big-IP exploit detector released

ig-arrow-blue

Risky Business: Episode #592: We're back. Did we miss anything?

ig-arrow-blue

Dark Reading: Email Security Features Fail to Prevent Phishable 'From' Addresses

ig-arrow-blue

Dark Reading: 8 Cybersecurity Themes to Expect at Black Hat USA 2020

ig-arrow-blue

PSBE Cyber News Group: Too many security tools weaken enterprise incident response study finds

ig-arrow-blue

Solutions Review: Key Takeaways: The/2020 Gartner Market Guide for Network Detection and Response

ig-arrow-blue

HelpNet Security: Corelight announces open NDR platform by integrating Zeek and Suricata

ig-arrow-blue

MSSP Alert: MSSP News - 06/16

ig-arrow-blue

Digital Bulletin: A Life in Tech: Anton Grashion

ig-arrow-blue

ZDNet: NSA warns of new Sandworm attacks on email servers

ig-arrow-blue

SC Magazine UK: Life on Mars: security in extreme environments

ig-arrow-blue

SC Magazine UK: Verizon report analysis: Money not espionage at the heart of cyber-crime breaches

ig-arrow-blue

StateTech: Election Day Is Less Than 6 Months Away. Now Is the Time to Instrument Infrastructure

ig-arrow-blue

SC Magazine UK: University supercomputers shut down over cryptocurrency mining malware

ig-arrow-blue

Journal of Cyber Policy: Data AI

ig-arrow-blue

CRN: Women of the Channel

ig-arrow-blue

The CyberWire Daily Podcast: 5.12.20

ig-arrow-blue

Dark Reading: It Was 20 Years Ago Today: Remembering the ILoveYou Virus

ig-arrow-blue

BusinessInsider: 31 commercial open-source software startups that will thrive in 2020

ig-arrow-blue

Medical Technology News UK: The Hacker Will See You Now

ig-arrow-blue

SIGNAL Magazine: From Computer Zero to Cyber Hero

ig-arrow-blue

Forbes: U.S. Government Offers $5 Million Reward To Identify North Korean Hackers

ig-arrow-blue

InformationSecurityBuzz: US Issues Guidance On North Korean Hackers Offers $5M Reward

ig-arrow-blue

SC Magazine UK: DarkHotel exploits zero-day in VPN to attack China assets

ig-arrow-blue

Daily Mail: Johnson tweet of virtual Cabinet raises cybersecurity concerns

ig-arrow-blue

CSO: 12 top IDS/IPS tools

ig-arrow-blue

Silicon.uk.co: Coronavirus: Chinese Hackers APT41 Seek Exploits Amid Pandemic

ig-arrow-blue

Infoworld: Zeek and Jitsi: 2 open source projects we need now

ig-arrow-blue

CRN:/2020 Partner Program Guide: 5-Star Security Vendors

ig-arrow-blue

Forbes: Federal Commission Warns Dangerously Insecure U.S. At Risk Of ‘Catastrophic' Cyber Attack

ig-arrow-blue

Verdict UK: “Too late”: Cyberspace Solarium Commission report paints dark picture of US ravaged by cyberattacks

ig-arrow-blue

Daily Swig UK: Corelight's Richard Bejtlich on cyber warfare and the origin of the term ‘APT'

ig-arrow-blue

GCN: Countering network resident threats in government networks

ig-arrow-blue

Forbes: Meet America's Best Startup Employers/2020

ig-arrow-blue

Dark Reading: Corelight: Threat Hunting Adds Proactive Element to Security Strategy

ig-arrow-blue

CRN:/2020 Channel Chiefs

ig-arrow-blue

SecurityGuy TV: Corelight at RSA with Greg Bell

ig-arrow-blue

Washington Post: The Cybersecurity 202: Disinformation threat pushes Doomsday Clock closer to midnight

ig-arrow-blue

Wired: Meet the Mad Scientist Who Wrote the Book on How to Hunt Hackers

ig-arrow-blue

Tahawultech: How partners and MSSPs can optimise Corelight's offerings

ig-arrow-blue

Dark Reading: Intel Issues Fix for 'Plundervolt' SGX Flaw

ig-arrow-blue

SC Magazine UK: An attack or just a game?

ig-arrow-blue

Washington Post: The Cybersecurity 202: The Sony hack ushered in a dangerous era in cyberspace

ig-arrow-blue

ComputerWeekly: Alleged state hackers adapting to cover their tracks says NCSC

ig-arrow-blue

SVBJ: The Funded: 6 Bay Area startups raise over $270M at week's end

ig-arrow-blue

Pitchbook: Corelight shines with $50 million

ig-arrow-blue

Axios: Venture Capital Deals

ig-arrow-blue

Wall Street Journal: Cybersecurity Startup Corelight Raises $50 Million

ig-arrow-blue

VentureBeat: Corelight raises $50 million to monitor networks for intruders

ig-arrow-blue

Fortune: Term Sheet - Venture Deals

ig-arrow-blue

PE Hub: Corelight reels in $50 million

ig-arrow-blue

IT Security Guru: Corelight Raises $50 Million in Series C Funding Led by Insight Partners and Accel

ig-arrow-blue

Business Computing World UK: Corelight raises $50m for network traffic analysis in the cloud

ig-arrow-blue

LeMondeInformatique: Détection des intrusions réseau en temps réel chez Corelight

ig-arrow-blue

InformationAge: Why your organisation should deploy threat hunting teams and how to enable their success

ig-arrow-blue

SC Magazine: Malware snoops on diplomats government targets in Eastern Europe

ig-arrow-blue

Silicon UK: EU warns of State-sponsored attacks on 5G networks

ig-arrow-blue

ZDNet: DNS-over-HTTPS causes more problems than it solves experts say

ig-arrow-blue

SC Magazine: 'Tortoiseshell' group targets IT companies through supply-chain attacks

ig-arrow-blue

Have questions?

Talk with one of our experts today.

CONTACT US