Raspberry Pi sensors for home networks

Who’s your fridge talking to at night?

By Gary Fisk, Sales Engineer, Corelight I love origin stories – the tales of grand plans, unforeseen circumstances, and necessity that creates something new. These strange times have resulted in something new ...
Still Looking For RASP Resources? SANS Has A RASP Report

Still Looking For RASP Resources? SANS Has A RASP Report

It turns out the SANS Institute created a report titled, "Runtime Application Self-Protection (RASP), Investigation of the Effectiveness of a RASP Solution in Protecting Known Vulnerable Target Applications" in April of 2019, ...
Jake Williams: Combating Malware in 2020

Combating Malware in 2020: Process, Trends and Tools [Video]

Stay a step ahead of the adversaries planning their attack. The right framework prepares you, the latest data empowers you, and the right tools enable you ...
Cyber Security Roundup for September 2020

Cyber Security Roundup for September 2020

A roundup of UK focused Cyber and Information Security News, Blog Posts, Reports and general Threat Intelligence from the previous calendar month, August 2020.Taking security training courses and passing certification exams are ...
CIS-Critical-Security-Controls

Design & Implementation of OEM ICS Cybersecurity Frameworks: The Good, The Bad, and The Ugly

The cyber threat landscape today continues to pose a myriad of unique challenges. This is especially the case for industrial organizations due to factors such as aging equipment, poor design or implementation, ...

SANS@MIC Talk – Threat Hunting via DNS With Eric Conrad

Some of the finest threat hunting and security bits you'll feast-thine-eyes-upon anywhere. Enjoy. Permalink ...

Zeek & Sigma: Fully Compatible for Cross-SIEM Detections

By Alex Kirk, Corelight Global Principal for Suricata Corelight recently teamed up with SOC Prime, creators of advanced cyber analytics platforms, to add support for the entire Zeek data set into Sigma, ...

Chocolate and Peanut Butter, Zeek and Suricata

By Brian Dye, Chief Product Officer, Corelight Some things just go well together. A privilege of working with very sophisticated defenders in the open source community is seeing the design patterns they ...
How Security Teams Are Automating, According to a New SANS Survey

How Security Teams Are Automating, According to a New SANS Survey

Automation did not enter popular lexicon until the 1940s, when Henry Ford introduced an official “automation department” at his Michigan... The post How Security Teams Are Automating, According to a New SANS ...

SANS ISC – Johannes Ullrich’s ‘Citrix ADC Vulnerability: How/Why Does The Exploit Work’

Thanks to SANS for publishing their SANS ISC superlative SANS ISC videos on YouTube. Enjoy! Permalink ...