enterprise IoT

Enterprise Security Essentials

The cybersecurity threat landscape has become extremely vast and complex, as has cybersecurity technology. It’s becoming increasingly confusing for organizations to grasp the what, when, where and how of protecting the enterprise ...
Security Boulevard
PrintNightmare, SMB3 encryption, and your network

PrintNightmare, SMB3 encryption, and your network

By Yacin Nadji and Ben Reardon, Corelight Security Researchers CVE-2021-1675, also tracked in CVE-2021-34527, is a remote code execution vulnerability that targets the Windows Print Spooler service. In a nutshell, there is ...
MixMode Cyber Anomaly Detection Platform

New Video: MixMode Cyber Anomaly Detection Platform

We recently released a new video to better explain how MixMode’s next-generation cybersecurity anomaly detection platform combines the functionality of SIEM, NDR, NTA and UEBA for advanced threat detection, zero day attack ...
How to Close the Gaps in Your Security Investigations With Network Telemetry

Not the Final Answer on NDR in the Cloud …

Not the Final Answer on NDR in the Cloud …Back in my analyst years, I rather liked the concept of NDR or Network Detection and Response. And, despite having invented the acronym EDR, ...
Building a modern observability stack - Humio + Corelight webcast

CrowdStrike + Corelight partner to reach new heights

By Lana Knop, Chief Product Officer, Corelight Through our newly announced partnership with CrowdStrike, Corelight customers will be able to incorporate CrowdStrike’s best-in-class threat intelligence into Corelight Sensors to generate actionable alerts ...
tools SIEM TIP converge

Are TIPs Finally Converging With SIEMs?

When all vendors in a new product category use the same use case to explain their value, I become concerned. About 15 years ago, when bombs were a constant threat in many ...
Security Boulevard

Extending NDR visibility in AWS IaaS

By Vijit Nair, Sr. Director, Product Management, Corelight Comprehensive visibility is challenging in a cloud environment. While these environments are rich sources of telemetry and logs, it is challenging for security teams ...
Translating query into action

Translating query into action

By Vince Stoffer, Senior Director, Product Management, Corelight One of the most important aspects of threat hunting is having a place to start. A question, a theory, or a hunch often begins ...
Getting the most out of your NIDS

Getting the most out of your NIDS

By Jon Natkins, Product Manager, Corelight Network Intrusion Detection Systems (NIDS) are widely deployed by the most sophisticated blue teams in the world. For well-funded organizations, there is little question about the ...
Raspberry Pi sensors for home networks

Who’s your fridge talking to at night?

By Gary Fisk, Sales Engineer, Corelight I love origin stories – the tales of grand plans, unforeseen circumstances, and necessity that creates something new. These strange times have resulted in something new ...

Secure Guardrails