MSSP Alert: Partnership – Network Detection and Response (NDR)

grey right arrow

Journal of Cyber Policy: New takes on the Solar Winds hack(s)

grey right arrow

National Defense: Nothing seems to stop relentless hackers exfiltrating trade secrets

grey right arrow

Turn the Lens with Jeff Frick: Interview with Michele Bettencourt

grey right arrow

Dark Reading: A security practitioner's guide to encrypted DNS

grey right arrow

FCW: CISA: SolarWinds' Orion may not be only entry point for hackers

grey right arrow

The World from PRX: US cybersecurity firm is victim of cyber hack by foreign state

grey right arrow

WIRED: Russia's FireEye Hack Is a Statement—but Not a Catastrophe

grey right arrow

TechBeacon: Do security like a boss

grey right arrow

DarkReading: From FUD to fix

grey right arrow

Enterprise Security Tech: Corelight Appoints Seasoned Sales Executive to Accelerate Growth Across the Americas

grey right arrow

Enterprise Security Tech: Corelight Appoints Seasoned Sales Executive to Accelerate Growth Across the Americas

grey right arrow

The Cyberwire: Products, services and solutions

grey right arrow

Enterprise Security Tech: Corelight extends Open NDR platform

grey right arrow

VMBlog: Corelight extends Open NDR platform

grey right arrow

AiTHORITY: Corelight extends Open NDR platform

grey right arrow

Journal of Cyber Policy: Corelight extends Open NDR platform

grey right arrow

C4ISRNET: A three-step cybersecurity plan for the modern military

grey right arrow

Toolbox: Encrypted traffic is a backdoor for malware - defend your networks now

grey right arrow

Dark Reading: Encrypted Traffic Inference: An Alternative to Enterprise Network Traffic Decryption

grey right arrow

Reuters: From Wall Street to Silicon Valley, LGBT+ investment on the rise

grey right arrow

TechBeacon: Is an open-source SOC right for your organization?

grey right arrow

SF Business Times: Corelight names former McAfee executive Brian Dye as CEO

grey right arrow

StateScoop: Why North Carolina outsourced election cybersecurity to a 'CISO-as-a-service'

grey right arrow

Federal News Network: How enhanced network visibility enables federal agencies to ‘defend the house’

grey right arrow

ComputerWeekly: Channel roundup: Who’s gone where?

grey right arrow

Arabian Reseller: Corelight Welcomes Two New Executives to Lead EMEA Sales and Channel

grey right arrow

The Daily Swig: Cat and mouse: Privacy advocates fight back after China tightens surveillance controls

grey right arrow

CSO: 18 (new) ways attackers can compromise email

grey right arrow

InfoSecurity: #BHUSA: Researchers Reveal Attacks Against Email Sender Authentication

grey right arrow

WIRED: Decades-Old Email Flaws Could Let Attackers Mask Their Identities

grey right arrow

SecurityGuyTV: Episode 1690: Open Network Detection and Response Platform

grey right arrow

GCN: 3 questions to answer before implementing SOAR

grey right arrow

Risky Business: Episode #592: We're back. Did we miss anything?

grey right arrow

ITNews: Open source F5 Big-IP exploit detector released

grey right arrow

Dark Reading: Email Security Features Fail to Prevent Phishable 'From' Addresses

grey right arrow

Dark Reading: 8 Cybersecurity Themes to Expect at Black Hat USA 2020

grey right arrow

SC Magazine UK: Too many security tools weaken enterprise incident response, study finds

grey right arrow

Solutions Review: Key Takeaways: The 2020 Gartner Market Guide for Network Detection and Response

grey right arrow

HelpNet Security: Corelight announces open NDR platform by integrating Zeek and Suricata

grey right arrow

MSSP Alert: MSSP News - June 16

grey right arrow

Digital Bulletin: A Life in Tech: Anton Grashion

grey right arrow

ZDNet: NSA warns of new Sandworm attacks on email servers

grey right arrow

SC Magazine UK: Life on Mars: security in extreme environments

grey right arrow

SC Magazine UK: Verizon report analysis: Money not espionage at the heart of cyber-crime breaches

grey right arrow

StateTech: Election Day Is Less Than 6 Months Away. Now Is the Time to Instrument Infrastructure

grey right arrow

SC Magazine UK: University supercomputers shut down over cryptocurrency mining malware

grey right arrow

Journal of Cyber Policy: Data, AI, and Monitoring in Cybersecurity

grey right arrow

CRN: Women of the Channel

grey right arrow

The CyberWire Daily Podcast: 5.12.20

grey right arrow

Dark Reading: It Was 20 Years Ago Today: Remembering the ILoveYou Virus

grey right arrow

BusinessInsider: 31 commercial open-source software startups that will thrive in 2020

grey right arrow

Medical Technology News UK: The Hacker Will See You Now

grey right arrow

SIGNAL Magazine: From Computer Zero to Cyber Hero

grey right arrow

Forbes: U.S. Government Offers $5 Million Reward To Identify North Korean Hackers

grey right arrow

InformationSecurityBuzz: US Issues Guidance On North Korean Hackers, Offers $5M Reward

grey right arrow

SC Magazine UK: DarkHotel exploits zero-day in VPN to attack China assets

grey right arrow

Daily Mail: Johnson tweet of virtual Cabinet raises cybersecurity concerns

grey right arrow

CSO: 12 top IDS/IPS tools

grey right arrow

Silicon.uk.co: Coronavirus: Chinese Hackers APT41 Seek Exploits Amid Pandemic

grey right arrow

Infoworld: Zeek and Jitsi: 2 open source projects we need now

grey right arrow

CRN: 2020 Partner Program Guide: 5-Star Security Vendors

grey right arrow

Forbes: Federal Commission Warns Dangerously Insecure U.S. At Risk Of ‘Catastrophic’ Cyber Attack

grey right arrow

Verdict UK: “Too late”: Cyberspace Solarium Commission report paints dark picture of US ravaged by cyberattacks

grey right arrow

Daily Swig UK: Corelight’s Richard Bejtlich on cyber warfare and the origin of the term ‘APT’

grey right arrow

GCN: Countering network resident threats in government networks

grey right arrow

Forbes: Meet America's Best Startup Employers 2020

grey right arrow

Dark Reading: Corelight: Threat Hunting Adds Proactive Element to Security Strategy

grey right arrow

CRN: 2020 Channel Chiefs

grey right arrow

SecurityGuy TV: Corelight at RSA with Greg Bell

grey right arrow

Washington Post: The Cybersecurity 202: Disinformation threat pushes Doomsday Clock closer to midnight

grey right arrow

Tahawultech: How partners and MSSPs can optimise Corelight’s offerings

grey right arrow

Wired: Meet the Mad Scientist Who Wrote the Book on How to Hunt Hackers

grey right arrow

Dark Reading: Intel Issues Fix for 'Plundervolt' SGX Flaw

grey right arrow

SC Magazine UK: An attack or just a game?

grey right arrow

Washington Post: The Cybersecurity 202: The Sony hack ushered in a dangerous era in cyberspace

grey right arrow

ComputerWeekly: Alleged state hackers adapting to cover their tracks, says NCSC

grey right arrow

SVBJ: The Funded: 6 Bay Area startups raise over $270M at week's end

grey right arrow

Pitchbook: Corelight shines with $50 million

grey right arrow

Axios: Venture Capital Deals

grey right arrow

Wall Street Journal: Cybersecurity Startup Corelight Raises $50 Million

grey right arrow

VentureBeat: Corelight raises $50 million to monitor networks for intruders

grey right arrow

Fortune: Term Sheet - Venture Deals

grey right arrow

PE Hub: Corelight reels in $50 million

grey right arrow

Business Computing World UK: Corelight raises $50m for network traffic analysis in the cloud

grey right arrow

IT Security Guru: Corelight Raises $50 Million in Series C Funding Led by Insight Partners and Accel

grey right arrow

InformationAge: Why your organisation should deploy threat hunting teams and how to enable their success

grey right arrow

LeMondeInformatique: Détection des intrusions réseau en temps réel chez Corelight

grey right arrow

SC Magazine: Malware snoops on diplomats, government targets in Eastern Europe

grey right arrow

Silicon UK: EU warns of State-sponsored attacks on 5G networks

grey right arrow

ZDNet: DNS-over-HTTPS causes more problems than it solves, experts say

grey right arrow

SC Magazine: 'Tortoiseshell' group targets IT companies through supply-chain attacks

grey right arrow

Solutions Review: The 14 Best Network Traffic Analysis Solutions for 2019 and Beyond

grey right arrow

InformationSecurity Buzz: Newly Discovered Cyber-Espionage Malware Abuses Windows BITS Service

grey right arrow

InformationSecurity Buzz: Glupteba Malware Uses Bitcoin Blockchain To Update C2 Domains

grey right arrow

Verdict: A third of experts predict cybersecurity won’t need human decision-makers within a decade

grey right arrow

SC Magazine: First Look: Corelight Sensor

grey right arrow

InformationSecurity Buzz: Attackers Use Backdoor And RAT Cocktail To Target The Balkans

grey right arrow

Washington Post: The Cybersecurity 202: Trump administration did right thing with cyberattack against Iran, say experts

grey right arrow

CRN: 2019 Partner Program Guide

grey right arrow