Corelight stories
Corelight unveils AI triage to speed transparent SOC ops
Last month
#
firewalls
#
network security
#
advanced persistent threat protection
Corelight launches Agentic Triage, an AI-driven workflow to speed SOC investigations while exposing every step for transparent review.
Tailscale unveils Aperture to govern workplace AI use
Thu, 19th Feb 2026
#
firewalls
#
data protection
#
siem
Tailscale launches Aperture in open alpha, adding an identity-based gateway to log, govern and standardise workplace AI and agent use.
Cyderes names Lana Knop Chief Product Officer for AI push
Sat, 24th Jan 2026
#
saas
#
siem
#
digital transformation
Cyderes appoints Lana Knop as Chief Product Officer to steer post‑Lucidum product strategy and drive a new wave of AI‑powered security services.
CrowdStrike unveils AI-powered agents to automate security tasks
Fri, 19th Sep 2025
#
martech
#
rpa
#
ai security
CrowdStrike launches AI-powered agents and a no-code platform to automate security tasks, helping analysts focus on strategic decisions within its Falcon platform.
SimSpace appoints Clint Sand as new Chief Product Officer
Mon, 26th Feb 2024
#
data analytics
#
advanced persistent threat protection
#
risk & compliance
Clint Sand steps into role as Chief Product Officer at SimSpace, tasked with boosting the company's cybersecurity platform.
Corelight unveils software capabilities for IDS subscription
Mon, 12th Dec 2022
#
advanced persistent threat protection
#
ndr
#
cybersecurity
Corelight has released improvements to its add-on on intrusion detection (IDS) subscription, allowing customers to replace their legacy IDS products.
Endace and Corelight step in to enhance incident response workflows
Fri, 12th Feb 2021
#
endace
#
product management
#
incident management
Endace and Corelight partner to provide security teams with detailed forensic data for rapid incident response.
Corelight and Exabeam partner to improve network monitoring
Fri, 14th Dec 2018
#
firewalls
#
network infrastructure
#
siem
The combination of lateral movement and siloed usage of point security products leaves many security teams vulnerable to compromise.