IP address
Rethinking Identity Threat Detection: Don’t Rely on IP Geolocation
SOC teams frequently look to the IP geolocation to determine whether an alert or activity poses a genuine threat. However, with the changing threat landscape, relying solely on this information is no ...
Don’t Be Evil: Google’s Scary ‘IP Protection’ Privacy Plan
Firefox here we come! “Free” privacy proxy for all Chrome users? What could POSSIBLY go wrong? ...
4 Ways IP Data Can Help Fight Cybercrime
Cybercrime is going up, not down, every year, despite the tens of billions of dollars companies invest in shoring up their information infrastructure. According to the Identity Theft Resource Center, 2021 was ...
Want To Protect Privacy? Get Off Social Media, Indiana Federal Court Says
Privacy issues surrounding social media abound, including what’s considered ‘content’ privacy and ‘non-content’ privacy When the government wants to get data about you from someone other than you (a third party), does ...
Corelight ECS Mapping: Unified Zeek data for more efficient analytics
By Ed Smith, Senior Product Marketing Manager, Corelight In addition to other great news we’ve recently shared, I’m pleased to announce that Corelight sensors now support the Elastic Common Schema (ECS) via ...
Is it Unlawful to Collect or Store TCP/IP Log Data for Security Purposes?
It is a common and accepted practice for entities to collect, store, process and analyze log data. This log data includes the IP addresses of every person (computer) that accessed or attempted ...