Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Threat Detection

Endpoints and Endpoint Detection: Importance & Risk Mapping

“Secure the endpoints!” This battle cry can sound like a meme, sure, but it also highlights arguably the most important part of modern cybersecurity today: are we securing the endpoints? A compromised network is likely to leave traces of anomalous and unauthorized activities that originate from network endpoints.

Dual Defenses: 10 Reasons Why NDR Is Essential Alongside EDR

Over the last few years, the evolution of cybersecurity strategies has seen a significant shift toward a more layered, nuanced, and, in many cases, advanced approach. Among these advancements, Network Detection and Response (NDR) has emerged as a critical component that continues to become more widely recognized and accepted across the industry for its efficacy in bolstering cybersecurity defenses.

Cybersecurity Threat Survival in 2024

Dealing with cybersecurity threats has become a constant challenge for organizations and tech professionals. The landscape is evolving, with cybercriminals employing increasingly sophisticated tactics. As we step into 2024, a year marked by economic uncertainty, staff layoffs, and the aftermath of widespread hybrid and remote work adoption, cyber threats are poised to exploit vulnerabilities within organizations.

Detect unknown network threats with Calico Cloud Honeypods

Based on the well-known cybersecurity method, “honeypots”, Calico Cloud runtime security approach of Honeypods as decoy pods are designed to attract traffic to them from malicious sources and to detect suspicious activity within a Kubernetes cluster.

Black Hat NOC USA 2023: Leveraging Corelight's Open NDR Platform for Network Operations (NetOps)

In this blog, I’ll share a few NetOps observations of the Black Hat network that I made during my time serving in the Black Hat Network Operations Center (NOC). My hope in doing so is to spark some ideas on how you can use an existing tool like Zeek for a new purpose. These insights were particularly revealing, despite not being linked to any security incidents.

Top 10 Fraud Detection Solutions for 2024

It’s natural to want to believe that every new account creation or online purchase signals the legitimate growth of your business. But the alarming rise in financial and data losses attributed to fraud, suggests a different reality. There are thousands of bad actors actively looking to nickel and dime businesses and consumers. In 2022, a staggering 2.4 million fraud reports flooded the Consumer Sentinel Record.

MDR vs MSSP vs SIEM: The Evolving Threat Detection Landscape

Effective threat detection is critical to achieving a mature cybersecurity posture. Yet with so many threat detection options on the market, from managed detection and response (MDR) to managed security service providers (MSSPs) to security information and event management (SIEM), choosing the most effective one for your organization can be challenging.

Inside the Mind of a Cybersecurity Threat Hunter Part 1: Confronting Initial Access Techniques

At Corelight, we’re always striving to make the life of threat hunters and security analysts a little easier. It’s the reason we developed our Open NDR Platform that provides comprehensive, correlated network data and forensic evidence about everything happening on the network. If you’re familiar with Corelight, you probably already know that.

How Corelight's ServiceNow integration speeds response

See how the integration between Corelight's Open NDR platform and ServiceNow allows analysts to send specified detections to ServiceNow, enabling efficient case management for in-depth analysis. Send selected detections with contextual information to ServiceNow with a few clicks, and easily jump from ServiceNow to view detection-related details in Corelight, resulting in faster time to case resolution/MTTR.