Using Corelight To Monitor and Identify Exploited VPNs

By Richard Bejtlich, Principal Security Strategist, Corelight´╗┐ Network and security infrastructure, such as routers, switches, firewalls, virtual private network concentrators, and other equipment, are designed to provide a stable and secure communications experience for client and server computers and their users. Many of us take these devices for granted, expecting that once properly configured they […]