Zeek & Sigma: Fully Compatible for Cross-SIEM Detections

By Alex Kirk, Corelight Global Principal for Suricata Corelight recently teamed up with SOC Prime, creators of advanced cyber analytics platforms, to add support for the entire Zeek data set into Sigma, the only generic signature language that enables … Continue reading Zeek & Sigma: Fully Compatible for Cross-SIEM Detections

Chocolate and Peanut Butter, Zeek and Suricata

By Brian Dye, Chief Product Officer, Corelight Some things just go well together. A privilege of working with very sophisticated defenders in the open source community is seeing the design patterns they use to secure their organizations – bo… Continue reading Chocolate and Peanut Butter, Zeek and Suricata

The light shines even brighter: Updates to Corelight’s Encrypted Traffic Collection

By Vince Stoffer, Senior Director, Product Management, Corelight With Corelight’s latest software release, v19, we are excited to announce the expansion of our Encrypted Traffic Collection (ETC). The ETC was introduced in late 2019, but as a remi… Continue reading The light shines even brighter: Updates to Corelight’s Encrypted Traffic Collection

Detecting GnuTLS CVE-2020-13777 using Zeek

By Johanna Amann, Software Engineer, Corelight CVE-2020-13777 is a high severity issue in GnuTLS. In a nutshell, GnuTLS versions between 3.6.4 (released 2018-09-24) and 3.6.14 (2020-06-03) have a serious bug in their session resumption code, which lets… Continue reading Detecting GnuTLS CVE-2020-13777 using Zeek

An Introduction to Baselining Technology

This is the first installment of the three part blog series on creating baselines of network behavior to improve your security stance. Here we will walk you through the basics of baselining technology.
The post An Introduction to Baselining Technology … Continue reading An Introduction to Baselining Technology

14 Reasons Professionals Give for Why Network Security is Getting Harder

A survey found most cybersecurity professionals think the function of network security is getting harder. The survey also asked them “Why?” and here are their answers.
The post 14 Reasons Professionals Give for Why Network Security is Getti… Continue reading 14 Reasons Professionals Give for Why Network Security is Getting Harder

6 Common Flaws that Can Emerge in a Network Security Strategy Over Time

As networks grow and evolve the change introduces new security flaws in the defenses. Here are six of the common flaws we see in our day-to-day work.
The post 6 Common Flaws that Can Emerge in a Network Security Strategy Over Time appeared first on Sec… Continue reading 6 Common Flaws that Can Emerge in a Network Security Strategy Over Time

Considerations for Planning, Structuring and Deploying a New Network Security Strategy

Planning and deploying a new network security strategy should involve many departments across the business and multiple steps. Here are considerations for rolling out a new strategy seamlessly.
The post Considerations for Planning, Structuring and Depl… Continue reading Considerations for Planning, Structuring and Deploying a New Network Security Strategy

Three Triggers Telling You It’s Time to Reconsider Your Network Security Strategy

Businesses are more reliant on their networks to conduct business so it’s important to evaluate a network security strategy as if your business depended on it.
The post Three Triggers Telling You It’s Time to Reconsider Your Network Security Stra… Continue reading Three Triggers Telling You It’s Time to Reconsider Your Network Security Strategy