By Vijit Nair, Sr. Director, Product Management, Corelight Visibility is paramount in securing your cloud environment – as the adage…
By Seth Hall, Co-Founder & Chief Evangelist, Corelight Zeek has been the darling of security defenders looking to get deep…
By Chris Mills In a recent blog post around Cobalt Strike, Chris Gerritz spoke about how important it was to…
Today, we’re excited to announce a partnership with Fugue to bring cloud security and compliance into development work streams, helping…
Development teams building applications use Nexus Repository (Nexus) to store and manage all of their components, build artifacts, and containers.…
This week, the Sonatype Security Research team has identified a series of counterfeit components in the npm ecosystem. These intentionally…
As if the increasing attacks on the open source ecosystem and vulnerabilities making headlines weren’t scary enough events, this Halloween…
My colleague has two kids, ages 9 and 12. Since the COVID lockdowns they have been playing more online games…
By Christian Kreibich, Principal Engineer, Corelight The past few weeks have seen several developments around Community ID, our open standard…
A technical analysis of Castle's performance in detecting and blocking a variety of credential stuffing attacks from Fall 2020.