CONTACT US
forrester wave report 2023

Close your ransomware case with Open NDR

SEE HOW

Download our free guide to find hidden attackers.

Find hidden attackers with Open NDR

SEE HOW

cloud-network

Corelight announces cloud enrichment for AWS, GCP, and Azure

READ MORE

corelight partner programe guide

Corelight's partner program

VIEW PROGRAM

glossary-icon

10 Considerations for Implementing an XDR Strategy

READ NOW

ad-images-nav_0006_Blog

Don't trust. Verify with evidence

READ BLOG

video

The Power of Open-Source Tools for Network Detection and Response

WATCH THE WEBCAST

ad-nav-ESG

The Evolving Role of NDR

DOWNLOAD THE REPORT

ad-images-nav_0006_Blog

Detecting 5 Current APTs without heavy lifting

READ BLOG

g2-medal-best-support-spring-2024

Network Detection and Response

SUPPORT OVERVIEW

 

News Coverage

Black Hat 2024: SOC in the NOC

ig-arrow-blue

Democratizing network security with AI and open-source collaboration

ig-arrow-blue

Corelight's Greg Bell, Co-founder and Chief Strategy Officer - in The Cube at mWise Conference 2024

ig-arrow-blue

Corelight's Brian Dye on NDR's Role in Defeating Ransomware

ig-arrow-blue

What a glimpse inside the Black Hat NOC reveals about infosec pros' security habits

ig-arrow-blue

7 network security startups to watch

ig-arrow-blue

Bloomberg: Hacks Are Getting More Severe: Accel's Mathew

ig-arrow-blue

Cisco-backed startup Corelight raises $150M to expand network security services

ig-arrow-blue

Network Security Firm Corelight Raises $150 Million

ig-arrow-blue

Corelight Secures $150 Million in Series E Funding Led by Accel, with participation from Cisco Investments and CrowdStrike

ig-arrow-blue

Cisco plugs in to Corelight’s “fuel for modern security”

ig-arrow-blue

Cisco-Backed Corelight Receives $150 Million Investment

ig-arrow-blue

Island, Corelight Partners to Gain from Massive Funding Rounds

ig-arrow-blue

Interview With Bernard Brantley - CISO at Corelight

ig-arrow-blue

The 20 Coolest Network Security Companies Of 2024: The Security 100

ig-arrow-blue

The Importance of Disruption – How to Add Resilience to Today’s Security Model

ig-arrow-blue

Council Post: What I've Learned About Cybersecurity From The Ocean

ig-arrow-blue

200+ Alarming Cybersecurity Stats & Insights from Security Experts

ig-arrow-blue

Google Cloud Introduces Security AI Workbench, Combines Mandiant Threat Intelligence

ig-arrow-blue

Corelight's Jean Schaffer emphasizes securing entire infrastructure before moving to threat-hunting phase

ig-arrow-blue

Risky Business #703 -- Russia whines about its tech dependence on China

ig-arrow-blue

Google Cloud Announces New Security AI Workbench and Ecosystem Expansion at RSAC 2023

ig-arrow-blue

Corelight to Expand AI Usage Across Portfolio, Including Industry Leading GPT-Driven Integrations

ig-arrow-blue

Corelight expands AI usage across its portfolio to boost SOC efficacy

ig-arrow-blue

Daggerfly swarms African telco. EvilExtractor described. Patriotic hacktivism in East Asia. Updates on Russia's hybrid war.

ig-arrow-blue

Endpoint Security and Network Monitoring News for the Week of April 21; Lookout, IRONSCALES, Lumu, and More

ig-arrow-blue

Cybersecurity Alignment: Best Practices and Why It Matters to Enterprises

ig-arrow-blue

2023 Partner Program Guide: 5-Star Security Vendor Programs

ig-arrow-blue

2023 Partner Program Guide

ig-arrow-blue

Corelight Pursues IR Partnerships, Smaller Enterprise Deals

ig-arrow-blue

Meet the 10 most active VC cybersecurity investors

ig-arrow-blue

Normalyze Granted Patent for Data Security Posture Management (DSPM)

ig-arrow-blue

Turning the Tables on the Network Intruder

ig-arrow-blue

What is Network Detection and Response (NDR)? Ultimate Guide

ig-arrow-blue

HowTo: Accelerate Detection and Response in the Cloud

ig-arrow-blue

The 20 Coolest Network Security Companies Of 2023: The Security 100

ig-arrow-blue

Zscaler acquiring Canonic Security. Sandbox AQ raises $500 million in funding. Labor markets.

ig-arrow-blue

Managed Security Services Provider (MSSP) Market News: 9 February 2023

ig-arrow-blue

An update on ESXiArgs. Criminal recon. Cyberespionage: from phishing to war floating.

ig-arrow-blue

Managed Security Services Provider (MSSP) Market News: 8 February 2023

ig-arrow-blue

Corelight Expands Partnership With CrowdStrike to Provide Network Detection and Response Technology for CrowdStrike Services

ig-arrow-blue

How Berkeley Lab Helped Develop One of the World's Most Popular Open-Source Security Monitoring Platforms

ig-arrow-blue

Tenable's $25M Venture Capital Fund Seeks Early-Stage Firms

ig-arrow-blue

Why enterprises need a complete data strategy [Q&A]

ig-arrow-blue

MIT Taxonomy Helps Build Explainability Into the Components of Machine-Learning Models

ig-arrow-blue

Key Takeaways: 2022 Gartner Market Guide for Network Detection and Response (NDR)

ig-arrow-blue

Best 50 Blogs to Follow to Learn Cyber Security in 2023

ig-arrow-blue

Headcount: Firings, Hirings, and Retirings — November 2022

ig-arrow-blue

Turning Data into Evidence to Accelerate SecOps Success

ig-arrow-blue

Daily Briefing 12.1.2022

ig-arrow-blue

31 CISOs share their security priorities and predictions for 2023

ig-arrow-blue

Microsoft Defender Gets New Security Protections

ig-arrow-blue

The Key to a Strong Cyber Defense: Turning Data into Evidence

ig-arrow-blue

Week in review: High-severity OpenSSL vulnerabilities fixed, Patch Tuesday forecast

ig-arrow-blue

Daily Briefing 11/2/22

ig-arrow-blue

Business Briefing 11/2/22

ig-arrow-blue

Daily Briefing 11/1/2022

ig-arrow-blue

Infosec products of the month: October 2022

ig-arrow-blue

Container Security: why so different?

ig-arrow-blue

Decipher podcast: Kelley Misata

ig-arrow-blue

Security Review Magazine: Corelight launches Investigator for the MEA region with Spire Solutions

ig-arrow-blue

Cyber Security News: 6 best free malware analysis tools to break down the malware samples

ig-arrow-blue

HelpNet Security: New infosec products of the week: Oct. 21 2022

ig-arrow-blue

ExecutiveGov: Corelight's Federal CTO, Jean Schaffer, talks improving Federal acquisition processes

ig-arrow-blue

HelpNet Security: Corelight Cloud Sensor SaaS for AWS accelerates incident response for security teams

ig-arrow-blue

MSSP Alert: Network Detection and Response (NDR) for AWS

ig-arrow-blue

VMBlog: Corelight unveils Cloud Sensor SaaS for AWS to help SOCs turn cloud traffic into comprehensive correlated evidence

ig-arrow-blue

Yahoo Finance: Corelight unveils Cloud Sensor SaaS for AWS to help SOCs turn cloud traffic into comprehensive correlated evidence

ig-arrow-blue

Potomac Officers Club: Executive Spotlight: Jean Schaffer, Federal CTO at Corelight

ig-arrow-blue

The Cyberwire: Corelight appoints Dr. Kelley Misata to lead open source strategy

ig-arrow-blue

VMBlog: Zeek is now a component of Microsoft Windows

ig-arrow-blue

The Cyberwire: Detecting the Manjusaka C2 framework

ig-arrow-blue

Risky Business Episode #677: A day late and a dollar short: China doxxes NSA op

ig-arrow-blue

EnterpriseSecurityTech: Bernard Brantley, Corelight Shares the importance of embracing an evidence-based security strategy

ig-arrow-blue

eSecurity Planet: Top Network Detection & Response (NDR) solutions

ig-arrow-blue

EnterpriseSecurityTech:/2022 Tech Ascension Awards recognize the Most Innovative Cybersecurity Companies

ig-arrow-blue

HelpNet Security: How organizations can implement a complete data strategy

ig-arrow-blue

FedScoop: Startups press Congress to improve how DOD buys software

ig-arrow-blue

BankInfoSecurity: Zero Trust: The nitty-gritty details

ig-arrow-blue

BankInfoSecurity: Harnessing the power of open source to protect networks

ig-arrow-blue

SF Business Times: Outstanding Voices/2022: Michele Bettencourt

ig-arrow-blue

HelpNet Security: Corelight Investigator allows security teams to accelerate their threat hunting and investigations

ig-arrow-blue

Teiss: New platform delivers open-source-powered network evidence

ig-arrow-blue

Dark Reading: Corelight announces new SaaS platform for threat hunting

ig-arrow-blue

VMblog: Corelight announces new platform

ig-arrow-blue

Teiss: Why cyber teams should always verify with evidence

ig-arrow-blue

MeriTalk: Celebrate the/2022 Cyber Defenders award winners

ig-arrow-blue

Intelligent CISO: Go phish: Bernard Brantley at Corelight

ig-arrow-blue

Risky Business: Episode #661: Viasat hack details firm up

ig-arrow-blue

CRN:/2022 Partner program guide: 5-star security vendor

ig-arrow-blue

GCN: Using the Sherlock Holmes method for cyber defense

ig-arrow-blue

Data Center Knowledge: Network Encryption: A double-edged sword for cybersecurity

ig-arrow-blue

Wall Street Journal: The Russia-Ukraine cyberwar could outlast the shooting war

ig-arrow-blue

IDG Connect: The Secret CSO: Bernard Brantley, Corelight

ig-arrow-blue

HelpNet Security: Are separate SIEMs for threat hunting a good idea?

ig-arrow-blue

CRN: The Security 100

ig-arrow-blue

CRN: CRN Channel Chiefs, Rick Beattie, Corelight

ig-arrow-blue

ITProPortal: Why understanding your data is the key to a successful cybersecurity strategy

ig-arrow-blue

FedScoop Radio: The Daily Scoop Podcast: Jean Schaffer federal chief technology officer at Corelight

ig-arrow-blue

HelpNet Security: Extracting value from the interconnected network of risk management

ig-arrow-blue

Solutions Review: 32 experts share advice on information security in/2022

ig-arrow-blue

FinanceBuzz: 9 women investors crushing it in 2021

ig-arrow-blue

Risky Business: Episode #644: USA sanctions NSO Group hits Revil

ig-arrow-blue

GreenBiz: Climate tech needs cybersecurity

ig-arrow-blue

Dark Reading: Corelight unveils Corelight Labs a hub for research and innovation

ig-arrow-blue

Network Computing: Packet capture: What if less is more?

ig-arrow-blue

SecurityWeekly: Episode #242: Corelight secures $75 million in series D funding

ig-arrow-blue

IDG Connect: C-suite career advice: Brian Dye Corelight

ig-arrow-blue

MSSP Alert: Talent – Network Detection and Response

ig-arrow-blue

Solutions Review: Corelight secures $75 million in series D funding

ig-arrow-blue

Pitchbook: Corelight lands $75M for cybersecurity platform

ig-arrow-blue

ExecutiveBiz: Network security company Corelight raises $75M in series D financing round

ig-arrow-blue

LA TechWatch: The weekly notable Startup funding report: 9/6/21

ig-arrow-blue

AITHORITY: H.I.G. Growth Partners invests in Corelight's $75M series D financing

ig-arrow-blue

Silicon Valley Business Journal: The Funded: Companies in SPAC mergers have dropped in value by billions

ig-arrow-blue

Business Leader: Corelight secures $75m Series D funding to support growth plans

ig-arrow-blue

SaaS Industry: Corelight raises $75M in a Series D round led by Energy Impact Partners

ig-arrow-blue

TechCrunch: Corelight secures $75M series d to bolster its network defense offering

ig-arrow-blue

Yahoo! Finance: Corelight secures $75M series D to bolster its network defense offering

ig-arrow-blue

Crunchbase News: Corelight lands $75m

ig-arrow-blue

CRN UK: Corelight targeting EMEA channel growth following $75m funding round

ig-arrow-blue

SecurityWeek: Corelight banks $75M for network monitoring expansion plans

ig-arrow-blue

SF Business Times: Corelight raised $75M in series D funding

ig-arrow-blue

SiliconANGLE: Corelight secures $75M to detect hacking attempts with open-source technology

ig-arrow-blue

VC News Daily: Corelight Pulls In $75M Series D Round

ig-arrow-blue

Dark Reading: Corelight secures $75 million in Series D Funding led by Energy Impact Partners

ig-arrow-blue

SC Magazine: The power of time in cybersecurity investigations

ig-arrow-blue

SecurityWeekly: Episode #237: Corelight Smart PCAPs

ig-arrow-blue

CRN: The 20 hottest cybersecurity products at Black Hat/2021

ig-arrow-blue

MSSP Alert: Black Hat/2021 live blog: MDR, XDR and MSSP updates

ig-arrow-blue

The Cyberwire: Corelight introduces Smart PCAP

ig-arrow-blue

O'Dwyer's: On the Move

ig-arrow-blue

Dark Reading: Cybersecurity through the lens of COVID

ig-arrow-blue

CTOVision: CTOs: Please help keep the government from wasting money help them learn to buy instead of build their software

ig-arrow-blue

ChannelVision: Secureworks unveils Technology Alliance Partner program to protect from advanced cyber threats

ig-arrow-blue

MSSP Alert: Secureworks launches XDR Technology Alliance Partner program

ig-arrow-blue

MeriTalk: Industry advises on security implications for IPv6 transition

ig-arrow-blue

VMBlog: Corelight Introduces Command and Control Collection for Targeted Insights and Detections

ig-arrow-blue

The CyberWire: Corelight Introduces Command and Control Collection for Targeted Insights And Detections

ig-arrow-blue

SC Magazine: H&R Block seeks out open-source expertise for SOC

ig-arrow-blue

IT Security Wire: CrowdStrike Security Cloud Integrates With Network Detection And Response Solutions For Comprehensive Platform Responses To Threats

ig-arrow-blue

TechRepublic: How the open source community helped firms investigate their network activity following SolarWinds

ig-arrow-blue

Intelligence Community News: Jean Schaffer joins Corelight as federal CTO

ig-arrow-blue

GovConWire: Intell community vet Jean Schaffer named CTO of Corelight's Federal arm

ig-arrow-blue

The Cyberwire: Former Defense Intelligence Agency CISO joins Corelight as Federal CTO

ig-arrow-blue

SecurityWeek: All eyes on PCAP: The gold standard of traffic analysis

ig-arrow-blue

The Cyberwire: Greg Bell: Answers the question of "why?" [open source]

ig-arrow-blue

CSO: New US CISO appointments

ig-arrow-blue

SIGNAL magazine: Flexible consistency improves information security

ig-arrow-blue

CRN: Corelight: 5-star partner program

ig-arrow-blue

MSSP Alert: Partnership – Network Detection and Response (NDR)

ig-arrow-blue

Journal of Cyber Policy: New takes on the Solar Winds hack(s)

ig-arrow-blue

National Defense: Nothing seems to stop relentless hackers exfiltrating trade secrets

ig-arrow-blue

Turn the Lens with Jeff Frick: Interview with Michele Bettencourt

ig-arrow-blue

NPR: Why Russia 05/have stepped up its hacking game

ig-arrow-blue

Dark Reading: A security practitioner's guide to encrypted DNS

ig-arrow-blue

FCW: CISA: SolarWinds' Orion 05/not be only entry point for hackers

ig-arrow-blue

The World from PRX: US cybersecurity firm is victim of cyber hack by foreign state

ig-arrow-blue

WIRED: Russia's FireEye Hack Is a Statement—but Not a Catastrophe

ig-arrow-blue

TechBeacon: Do security like a boss

ig-arrow-blue

DarkReading: From FUD to fix

ig-arrow-blue

Enterprise Security Tech: Corelight Appoints Seasoned Sales Executive to Accelerate Growth Across the Americas

ig-arrow-blue

The Cyberwire: Products services and solutions

ig-arrow-blue

Enterprise Security Tech: Corelight extends Open NDR platform

ig-arrow-blue

AiTHORITY: Corelight extends Open NDR platform

ig-arrow-blue

Journal of Cyber Policy: Corelight extends Open NDR platform

ig-arrow-blue

VMBlog: Corelight extends Open NDR platform

ig-arrow-blue

C4ISRNET: A three-step cybersecurity plan for the modern military

ig-arrow-blue

Toolbox: Encrypted traffic is a backdoor for malware - defend your networks now

ig-arrow-blue

Dark Reading: Encrypted Traffic Inference: An Alternative to Enterprise Network Traffic Decryption

ig-arrow-blue

Reuters: From Wall Street to Silicon Valley LGBT+ investment on the rise

ig-arrow-blue

TechBeacon: Is an open-source SOC right for your organization?

ig-arrow-blue

SF Business Times: Corelight names former McAfee executive Brian Dye as CEO

ig-arrow-blue

StateScoop: Why North Carolina outsourced election cybersecurity to a 'CISO-as-a-service'

ig-arrow-blue

Federal News Network: How enhanced network visibility enables federal agencies to ‘defend the house'

ig-arrow-blue

ComputerWeekly: Channel roundup: Who's gone where?

ig-arrow-blue

Arabian Reseller: Corelight Welcomes Two New Executives to Lead EMEA Sales and Channel

ig-arrow-blue

The Daily Swig: Cat and mouse: Privacy advocates fight back after China tightens surveillance controls

ig-arrow-blue

CSO: 18 (new) ways attackers can compromise email

ig-arrow-blue

InfoSecurity: #BHUSA: Researchers Reveal Attacks Against Email Sender Authentication

ig-arrow-blue

SecurityGuyTV: Episode 1690: Open Network Detection and Response Platform

ig-arrow-blue

WIRED: Decades-Old Email Flaws Could Let Attackers Mask Their Identities

ig-arrow-blue

GCN: 3 questions to answer before implementing SOAR

ig-arrow-blue

ITNews: Open source F5 Big-IP exploit detector released

ig-arrow-blue

Risky Business: Episode #592: We're back. Did we miss anything?

ig-arrow-blue

Dark Reading: Email Security Features Fail to Prevent Phishable 'From' Addresses

ig-arrow-blue

Dark Reading: 8 Cybersecurity Themes to Expect at Black Hat USA 2020

ig-arrow-blue

PSBE Cyber News Group: Too many security tools weaken enterprise incident response study finds

ig-arrow-blue

Solutions Review: Key Takeaways: The/2020 Gartner Market Guide for Network Detection and Response

ig-arrow-blue

HelpNet Security: Corelight announces open NDR platform by integrating Zeek and Suricata

ig-arrow-blue

MSSP Alert: MSSP News - 06/16

ig-arrow-blue

Digital Bulletin: A Life in Tech: Anton Grashion

ig-arrow-blue

ZDNet: NSA warns of new Sandworm attacks on email servers

ig-arrow-blue

SC Magazine UK: Life on Mars: security in extreme environments

ig-arrow-blue

SC Magazine UK: Verizon report analysis: Money not espionage at the heart of cyber-crime breaches

ig-arrow-blue

StateTech: Election Day Is Less Than 6 Months Away. Now Is the Time to Instrument Infrastructure

ig-arrow-blue

SC Magazine UK: University supercomputers shut down over cryptocurrency mining malware

ig-arrow-blue

Journal of Cyber Policy: Data AI

ig-arrow-blue

CRN: Women of the Channel

ig-arrow-blue

The CyberWire Daily Podcast: 5.12.20

ig-arrow-blue

Dark Reading: It Was 20 Years Ago Today: Remembering the ILoveYou Virus

ig-arrow-blue

BusinessInsider: 31 commercial open-source software startups that will thrive in 2020

ig-arrow-blue

Medical Technology News UK: The Hacker Will See You Now

ig-arrow-blue

SIGNAL Magazine: From Computer Zero to Cyber Hero

ig-arrow-blue

Forbes: U.S. Government Offers $5 Million Reward To Identify North Korean Hackers

ig-arrow-blue

InformationSecurityBuzz: US Issues Guidance On North Korean Hackers Offers $5M Reward

ig-arrow-blue

SC Magazine UK: DarkHotel exploits zero-day in VPN to attack China assets

ig-arrow-blue

Daily Mail: Johnson tweet of virtual Cabinet raises cybersecurity concerns

ig-arrow-blue

CSO: 12 top IDS/IPS tools

ig-arrow-blue

Silicon.uk.co: Coronavirus: Chinese Hackers APT41 Seek Exploits Amid Pandemic

ig-arrow-blue

Infoworld: Zeek and Jitsi: 2 open source projects we need now

ig-arrow-blue

CRN:/2020 Partner Program Guide: 5-Star Security Vendors

ig-arrow-blue

Forbes: Federal Commission Warns Dangerously Insecure U.S. At Risk Of ‘Catastrophic' Cyber Attack

ig-arrow-blue

Verdict UK: “Too late”: Cyberspace Solarium Commission report paints dark picture of US ravaged by cyberattacks

ig-arrow-blue

Daily Swig UK: Corelight's Richard Bejtlich on cyber warfare and the origin of the term ‘APT'

ig-arrow-blue

GCN: Countering network resident threats in government networks

ig-arrow-blue

Forbes: Meet America's Best Startup Employers/2020

ig-arrow-blue

Dark Reading: Corelight: Threat Hunting Adds Proactive Element to Security Strategy

ig-arrow-blue

CRN:/2020 Channel Chiefs

ig-arrow-blue

SecurityGuy TV: Corelight at RSA with Greg Bell

ig-arrow-blue

Washington Post: The Cybersecurity 202: Disinformation threat pushes Doomsday Clock closer to midnight

ig-arrow-blue

Wired: Meet the Mad Scientist Who Wrote the Book on How to Hunt Hackers

ig-arrow-blue

Tahawultech: How partners and MSSPs can optimise Corelight's offerings

ig-arrow-blue

Dark Reading: Intel Issues Fix for 'Plundervolt' SGX Flaw

ig-arrow-blue

SC Magazine UK: An attack or just a game?

ig-arrow-blue

Washington Post: The Cybersecurity 202: The Sony hack ushered in a dangerous era in cyberspace

ig-arrow-blue

ComputerWeekly: Alleged state hackers adapting to cover their tracks says NCSC

ig-arrow-blue

SVBJ: The Funded: 6 Bay Area startups raise over $270M at week's end

ig-arrow-blue

Pitchbook: Corelight shines with $50 million

ig-arrow-blue

Axios: Venture Capital Deals

ig-arrow-blue

Wall Street Journal: Cybersecurity Startup Corelight Raises $50 Million

ig-arrow-blue

VentureBeat: Corelight raises $50 million to monitor networks for intruders

ig-arrow-blue

Fortune: Term Sheet - Venture Deals

ig-arrow-blue

PE Hub: Corelight reels in $50 million

ig-arrow-blue

IT Security Guru: Corelight Raises $50 Million in Series C Funding Led by Insight Partners and Accel

ig-arrow-blue

Business Computing World UK: Corelight raises $50m for network traffic analysis in the cloud

ig-arrow-blue

LeMondeInformatique: Détection des intrusions réseau en temps réel chez Corelight

ig-arrow-blue

InformationAge: Why your organisation should deploy threat hunting teams and how to enable their success

ig-arrow-blue

SC Magazine: Malware snoops on diplomats government targets in Eastern Europe

ig-arrow-blue

Silicon UK: EU warns of State-sponsored attacks on 5G networks

ig-arrow-blue

ZDNet: DNS-over-HTTPS causes more problems than it solves experts say

ig-arrow-blue

SC Magazine: 'Tortoiseshell' group targets IT companies through supply-chain attacks

ig-arrow-blue

Have questions?

Talk with one of our experts today.

CONTACT US