How to Get Broader, Deeper MITRE Attack Coverage by Using EDR and NDR Together
BrandPost Extrahop

How to Get Broader, Deeper MITRE Attack Coverage by Using EDR and NDR Together

Network TTPs are critical for post-compromise, pre-breach detection & response

Gartner reports on handling challenges with TLS 1.3 and passive decryption
BrandPost Extrahop

Gartner reports on handling challenges with TLS 1.3 and passive decryption

Gartner takes a close look at security features, and in particular, the options available in cases where passive mode decryption is a requirement.

What’s Worse? RDP Open to the Internet or Closing Up Shop? RDP Best Practices to Follow in 2020
BrandPost Extrahop

What’s Worse? RDP Open to the Internet or Closing Up Shop? RDP Best Practices to Follow in 2020

Desperate times call for desperate measures, but you can still minimize risks.

ExtraHop Named in the 2020 Gartner Market Guide for UCaaS Monitoring
BrandPost Extrahop

ExtraHop Named in the 2020 Gartner Market Guide for UCaaS Monitoring

Unified Communications solutions have been integral to the enterprise for years, and as remote work becomes more common, the attack surface and potential for challenging performance issues increase with it.

Network Detection & Response vs. Network Traffic Analysis
BrandPost Extrahop

Network Detection & Response vs. Network Traffic Analysis

How does NDR relate to NTA in cybersecurity?

Most Security Pros Wish Their Company Did More Threat Hunting. Here’s How They Can.
BrandPost Extrahop

Most Security Pros Wish Their Company Did More Threat Hunting. Here’s How They Can.

Plus, we'll provide some clarity on what threat hunting actually *is*

With Cybersecurity Budgets Under Scrutiny, It’s Time to Get into Shape
BrandPost Extrahop

With Cybersecurity Budgets Under Scrutiny, It’s Time to Get into Shape

The current economic climate is an opportunity to re-architect your toolset for efficiency and effectiveness

New Research on Network Visibility and Threat Detection: A SANS Survey
BrandPost Extrahop

New Research on Network Visibility and Threat Detection: A SANS Survey

Detecting the threat from within: The need for greater east-west visibility

Insecure API Cloud Computing: The Causes & Solutions
BrandPost Extrahop

Insecure API Cloud Computing: The Causes & Solutions

There are a handful of best practices businesses should adopt to avoid accidental or malicious data exposure via APIs. Here are three.

Is Your Security Truly
BrandPost Extrahop

Is Your Security Truly "Cloud-Native"?

The cloud is designed to simplify delivery, scale, and management in order to drive innovation. Can it also be a force-multiplier for security?

How to Maximize Resources in Your Cybersecurity Workforce
BrandPost Extrahop

How to Maximize Resources in Your Cybersecurity Workforce

A skilled cybersecurity team working in conjunction with machine learning algorithms provides the best of both worlds, and the best possible security for your enterprise.

Why Wire Data Is the Purest Form of Truth in Cloud Security
BrandPost Extrahop

Why Wire Data Is the Purest Form of Truth in Cloud Security

Comparing wire data and log data for the cloud

What Does Cloud-Native Mean for Security?
BrandPost Extrahop

What Does Cloud-Native Mean for Security?

The best cloud-native security tools provide real-time detection of rogue instances, unauthorized access, and cyber attackers within the perimeter.

Understanding the Cloud Shared Responsibility Model
BrandPost Extrahop

Understanding the Cloud Shared Responsibility Model

Your responsibilities for securing IaaS, PaaS, and SaaS.

Load More
Top Blog Posts