Channel Avatar

Corelight @UC3nsuVl5AO7z-Qu-VTn8JQg@youtube.com

3.5K subscribers - no pronouns :c

Corelight transforms network and cloud activity into evidenc


36:14
Unify endpoint and network telemetry for any SIEM
01:01:21
Unify endpoint and network telemetry for any SIEM EMEA
58:00
When I grow up I want to be a Threat Hunter
56:04
How to find lateral movement with Zeek and MITRE ATT&CK
55:45
Benchmarking Threat Hunt Readiness
41:16
Does Network Telemetry Still Matter in Today's Threat Landscape?
01:00:51
Demystifying AI ML for Security Operations
01:49:29
SANS 2024 Threat Hunting Survey: Hunting for Normal Within Chaos
07:26
Corelight in the Black Hat NOC
05:53
Regardez Comment Carrefour Utilise Corelight
05:53
See How Carrefour Uses Corelight
05:53
How Carrefour uses Corelight to extend visibility and detect cyber attacks?
05:53
Comment Carrefour utilise Corelight pour étendre la visibilité et détecter les cyber attaques ?
01:22
Comment Corelight utilise l'IA pour renforcer les équipes SOC
01:31
Wie Corelight KI einsetzt, um SOC-Teams zu unterstützen
01:21
Cómo Corelight Utiliza la Inteligencia Artificial para Potenciar a los Equipos de SOC
01:47
The three network-based indicators of compromise (IOCs)
02:12
The advantage of network observation for cyber threat intelligence
05:36
How to operationalize cyber threat intelligence
02:54
Risk-based alert prioritization
02:04
Corelight’s approach to operationalizing cyber threat intelligence
01:53
How Corelight's ServiceNow integration speeds response
01:13
How Corelight Uses AI to Empower SOC Teams
37:12
SOC Visibility Triad, Why You Need NDR Alongside EDR
03:08
Corelight CEO, Brian Dye talks to NYSE's Trinity Chavez on 'The Cyber Series'
16:46
Learn about Corelight and Zeek® with AI
54:29
Stronger Together, RSAC 2023: Navigating security events with cyber partners
50:08
How Corelight Transforms Data Security with Normalyze
07:12
Entity Collection Overview
59:12
From Noise to Signal: Enrichment and Routing with Corelight, Cribl, and Elastic
01:00:24
Is Network Evidence Really Needed for Security Operations?
03:48:36
SANS 2022 Multicloud Survey Exploring the World of Multicloud
01:02:21
Network Detection and Incident Response with Open Source Tools
02:34
Corelight Investigator (Deutsch)
01:00:28
Threat hunt with network evidence with endpoint telemetry
01:00:00
The Power of Open-Source Tools for Network Detection & Incident Response
02:14
La plateforme Investigator de Corelight
50:22
Zero Trust in the Cloud
03:24
[Demo Video] Corelight + CrowdStrike Falcon Insight XDR
02:23
Corelight Investigator (Español)
01:03:34
SANS Protects: The Network
01:17:20
SANS 2022 Report Moving to a State of Zero Trust
49:47
Network Forensics & Incident Response with Open Source Tools
45:49
How to Benchmark Your Threat Hunting Readiness and Prepare for the Next Step
39:22
Raspberry Pi Sensors for Home Networks
04:36
How to Make Progress on the Zero Trust Road Map
46:41
Integrating Open NDR To Automate Alert Response Via Better Network Evidence
01:02:35
Break Threat Patterns with Complete Visibility Across all Your Data
02:02:43
SANS 2022 Threat Hunting Survey - Hunting for a Standard Methodology for Threat Hunting Teams
03:20
Corelight and CrowdStrike overview
31:00
Enhanced Network Evidence for the Modern SOC
00:24
Network evidence for Splunk
28:27
Real world use cases for NDR in the Cloud
02:06
Corelight Investigator
01:01:57
Comment se défendre contre des Cyberattaques étatiques ?
43:50
What does XDR mean for your organization?
45:15
Unify endpoint and network evidence
43:15
Network Evidence For XDR
59:18
[Webcast] Defending against nation-state actors
29:09
SANS 2022 Cloud Security Survey