traffic anomalies microsegmentation NDR network SASE K8s Network Traffic Analysis Security Goals 5g

Increasing Network Visibility: The Key to Security

Networks are becoming increasingly complex as organizations adopt a raft of new technologies and services, including edge computing, automation, connected devices, sensors and 5G. These complex networks undergird the essential services of ...
Security Boulevard

Network Visibility is Foundational to Cyber Security’s Vital Few

For more than a hundred years now the Pareto Principle has reminded us that the relationship between inputs and outputs is rarely in balance. Though the 80/20 rule began as a comparison ...

Network Visibility is Foundational to Cyber Security’s Vital Few

For more than a hundred years now the Pareto Principle has reminded us that the relationship between inputs and outputs is rarely in balance. Though the 80/20 rule began as a comparison ...

The Critical Role of Network Detection and Response in Improving Enterprise Security [Q&A with Vito Rallo of PwC]

Vito Rallo is Director of Cyber Incident and Threat Management at PwC. He and his team provide offensive security and incident and threat management services to medium and large enterprises. Prior to ...

The Critical Role of Network Detection and Response in Improving Enterprise Security [Q&A with Vito Rallo of PwC]

Vito Rallo is Director of Cyber Incident and Threat Management at PwC. He and his team provide offensive security and incident and threat management services to medium and large enterprises. Prior to ...
Telegram Zeek, you’re my main notice

Telegram Zeek, you’re my main notice

Notices in Zeek Zeek’s Notice Framework enables network operators to specify how potentially interesting network findings can be reported. This decoupling of detection and reporting highlights Zeek’s flexibility: a notice-worthy event in ...
Finding SolarWinds / SUNBURST backdoors with Zeek, Suricata, & Corelight

Detecting CVE-2021-31166 – HTTP vulnerability

By Ben Reardon, Corelight Security Researcher In this blog we aim to provide a little insight into part of the lifecycle of Corelight Lab’s response to a critical HTTP vulnerability. We’ve open-sourced ...

What the Cyber EO means for federal agencies

By Jean Schaffer, Federal CTO, Corelight For those of us who have spent our careers working in cybersecurity, President Biden’s recent “Executive Order on Improving the Nation’s Cybersecurity,” (EO) held no surprises ...

World’s first 100G Zeek sensor

By Sarah Banks, Senior Director of Product Management, Corelight As we finished rolling out Corelight’s v21 software release, which saw the delivery of the world’s first 100G, 1U Zeek sensor, I was ...
Introducing RDP Inferences

Introducing RDP Inferences

By Anthony Kasza, Technical Director, Corelight Corelight recently released a new package, focused on RDP inferences, as part of our Encrypted Traffic Collection. This package runs on Corelight Sensors and provides network ...