Using Corelight To Monitor and Identify Exploited VPNs

By Richard Bejtlich, Principal Security Strategist, Corelight Network and security infrastructure, such as routers, switches, firewalls, virtual private network concentrators, and other equipment, are designed to provide a stable and secure communications experience for client and server computers and their users. Many of us take these devices for granted, expecting that once properly configured they […]