Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Why Architecture Still Wins: Making SASE & SD-WAN Work Without Compromise

The shift to cloud, SaaS, and hybrid work is no longer breaking news. What is surprising is how many IT and network teams are still trying to stitch together architectures that weren’t designed for today’s distributed world. Data is everywhere. Users are everywhere. Applications live across SaaS, public cloud, and private data centers. Yet too often, traditional network and security architectures can’t keep up, creating bottlenecks, security gaps, and user frustration.

How Corelight Deployed Zeek at 20 Sites in 4 Months After 7-Year Stalemate

Corelight CEO Brian Dye shares the story of the company’s first multi-million-dollar customer—a team that had spent seven years trying to operationalize Zeek using another commercial vendor. With Corelight, they were up and running across 20 sites in just four months. This story highlights the foundational value Corelight provides: a hardened, scalable Zeek deployment that unlocks visibility, incident response, and threat hunting at scale.

How an Energy Customer Used FERC 887 Compliance to Boost Security

Corelight CEO Brian Dye shares how a customer in the energy sector turned a mandatory compliance project into a broader security win. Brought in to meet FERC 87 monitoring requirements for bulk electric systems, Corelight also helped advance their security operations. The customer used the compliance mandate not just to check a box—but to gain meaningful visibility and security value from day one.

ThreatBook Selected in the First-ever Gartner® Magic Quadrant for Network Detection and Response (NDR)

After nearly a year of research and evaluation, Gartner released the first "Magic Quadrant for Network Detection and Response" report on May 29, ThreatBook became the only Chinese company selected.

Inside the SectorCERT Denmark Attack: How Corelight Helped Stop a Coordinated Campaign

Corelight CEO Brian Dye recounts how Corelight supported SectorCERT—an alliance of energy companies in Denmark—during one of the most advanced attack sequences he’s seen. The coordinated campaign targeted a shared firewall vulnerability across nearly a dozen organizations. Corelight provided the critical visibility and detection that helped defenders stop the first wave—and stay ahead of a second, modified attack just weeks later. The incident became a model of collaboration and response across national infrastructure.

How Corelight Helped a Customer Reject a $10M Ransomware Demand

Corelight CEO Brian Dye shares the high-stakes story of a customer under a $10 million ransomware attack. The attackers claimed to have stolen sensitive IP—but with Corelight, the customer had the network visibility to verify exactly what was taken. The result? They confirmed the stolen data was limited and non-critical, enabling them to confidently deny the ransom demand. This powerful story illustrates the difference between “I think” and “I know”—and how that clarity can drive executive confidence, legal defensibility, and real-world savings.

Web Application Firewall (WAF) Best Practices For Optimal Security

Web and mobile application code protection is a must-have security control. Modern solutions such as application layer firewall help your organisation to keep those assets protected from threats like SQL injection, cross-site scripting and bot-driven attacks. This is where a Web Application Firewall (WAF) comes into the picture. A WAF has the capability of filtering, monitoring and blocking HTTP requests to protect the assets from malicious requests without affecting legitimate users.

Securing Against Attacks: How WAF Rate Limiting Works

Rate limiting plays a major role in application security, especially when it is about defending web applications from malicious bot attacks, credential stuffing, brute force attacks and excessive API calls. Rate limiting security ensures that systems function properly without overwhelming them. It controls the number of requests a client or a specific IP address can send over a specified time period.

How to Fix the Challenges with Web App Firewalls

How to Fix the Challenges with Web App Firewalls Is your WAF enough? A10 experts Jamison Utter and Gary Wang delve into advanced security strategies that surpass traditional web application firewalls (WAFs). In today’s ever-evolving threat landscape, organizations face numerous security challenges that necessitate a shift from conventional WAFs to next-generation solutions.