Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Build Smarter Threat Detection with Next-Gen SIEM

SOC teams across businesses, industries, and geographies share the same goal: Stop cyberattacks before damage is done. But for those with legacy SIEMs, this is nearly impossible to achieve. Legacy SIEMs demand an overwhelming investment of time, resources, and expertise to set up and maintain.

Arctic Wolf Incident Response: Advanced Threat Detection

Explore how Arctic Wolf’s experienced IR team helps organizations respond to threats swiftly and effectively. From a threat intelligence perspective, the Arctic Wolf IR team is always on top of new and emerging threats, which allows them to help organizations detect and recover from threats faster and more effectively, regardless of the organization’s environment, location, or specific incident characteristics.

Identity Threat Detection and Response: Practical Strategies for Protection

The Key to Protecting Your Directory Separating privileges is one of the most effective ways to stop cyberattacks from spreading. Proper security controls are needed at every level, from domain admins to workstation admins. But overcomplicated setups can actually do more harm than good. Learn how to build a practical, effective tiering model to secure your organization, without unnecessary complexity.

Quick FIX log management: How metadata simplifies financial protocol tracking (and how Corelight's platform can help)

Financial institutions, such as banks and trading houses, have a strong interest in recording key transaction activity within their networks. In the face of daunting data storage requirements, many are finding that Corelight’s network metadata—notably metadata produced by Zeek—is the key to a simplified tracking and storage process. Many of our customers used to rely on packet capture (PCAP).

How metadata wrestled control of FINRA's colossal data archiving requirements

The financial industry is known for its rigorous and sometimes quirky data retention requirements that can challenge even the most seasoned security expert. For example, FINRA Rule 4511 requires members to "preserve for a period of at least six years those FINRA books and records for which there is no specified period under the FINRA rules or applicable Exchange Act rules." Keeping six years of records: That's no small feat. But it's certainly doable.

Why Detection Engineering is Crucial for Effective Cyber Defense

A Continuously Changing Contrast While many experts concentrate on firewalls, encryption, and endpoint security, one area is often overlooked yet is crucial for ensuring systems are safeguarded: detection engineering. This is a habit that not only helps companies stop attacks but also is very important for quickly identifying and handling possible breaches. To reveal maliciousness, lower risk, and maintain networks and data cleanliness, one must first understand detection engineering.

For Science! - Threat hunting with SCinet at SC24

In November 2024, I participated in SCinet with the Network Security team at SC24. My job was supporting Corelight sensors and threat hunting using the data the sensors produced. This engagement allowed for a very constructive comparison between the networking challenges at SC and Black Hat USA, where I had the honor of working in the Network Operations Center (NOC) a few months earlier. At SC, I felt immersed in the cutting-edge world of research computing with people showcasing the fastest everything.

Running DeepSeek AI privately using open-source software

Zeek is a powerful open-source network analysis tool that allows users to monitor traffic and detect malicious activities. Users can write packages to detect cybersecurity events, like this GitHub repo that detects C2 from AgentTesla (a well-known malware family). Automating summarization and documentation using AI is often helpful when analyzing Zeek packages.

Top Strategies for Effective Cobalt Strike Detection in Your Network

Cobalt Strike is a penetration testing tool designed for adversary simulation and red team operations. Legitimately, it's used by security professionals to test network defenses, simulate attacks, and train incident response teams on how to detect and respond to real threats. Cobalt Strike was one of the first public red team command and control frameworks.

Why Pen Testing Is Essential in Today's Cyber Threat Landscape

The digital frontier is expanding quickly, with organizations across every industry depending on interconnected systems to communicate, store data, and drive innovation. However, as technology evolves, malicious actors also refine their tactics. This article examines key defenses that protect today's infrastructures.