Origin Story Part 2: A Forensic Examination of SUNBURST After Detection
BrandPost Extrahop

Origin Story Part 2: A Forensic Examination of SUNBURST After Detection

How to improve threat protection based on an analysis of the large-scale, SolarWinds Orion SUNBURST attack.

Behavior-based Detection and Rule-based Detection: Why Not Both?
BrandPost Extrahop

Behavior-based Detection and Rule-based Detection: Why Not Both?

Sophisticated cybersecurity attackers require a sophisticated network approach to protect the organization.

What’s the State of Hybrid and Cloud Security Tools?
BrandPost Extrahop

What’s the State of Hybrid and Cloud Security Tools?

Security and IT professionals share their experiences with existing data/workload challenges and the security tools they’re using.

Threat Intel: Analyzing the SolarWinds Attack
BrandPost Extrahop

Threat Intel: Analyzing the SolarWinds Attack

Dissection of the recent SUNBURST attack campaign provides crucial threat intelligence for strategic action.

Analyzing a Supply Chain Attack to Improve Threat Protection
BrandPost Extrahop

Analyzing a Supply Chain Attack to Improve Threat Protection

As supply chain attacks increase in sophistication, there are lessons to be learned from the Solar Winds SUNBURST incident.

Why Supply Chain Attacks Are So Destructive
BrandPost Extrahop

Why Supply Chain Attacks Are So Destructive

Attackers are increasing their dwell time and damage using sophistication and stealth.

 Strange Behavior: The Case for Machine Learning in Cybersecurity
BrandPost Extrahop

Strange Behavior: The Case for Machine Learning in Cybersecurity

Sophisticated anomaly detection is the real benefit of ML.

How to Monitor Sensitive Data and Stop Exfiltration via the Network
BrandPost Extrahop

How to Monitor Sensitive Data and Stop Exfiltration via the Network

Status quo mechanisms for monitoring sensitive data movement and stopping breaches aren't working.

Remote Work Isn't Going Away. Here's How to Secure WFH For The Long Haul
BrandPost Extrahop

Remote Work Isn't Going Away. Here's How to Secure WFH For The Long Haul

Listen in as ExtraHop engineers and partners explore how to secure their remote workforces without succumbing to changing security risks.

SIGRed: What Is It, How Serious Is It, and How Should You Respond?
BrandPost Extrahop

SIGRed: What Is It, How Serious Is It, and How Should You Respond?

Understanding the Microsoft DNS SIGRed Vulnerability CVE-2020-1350

Ripple20: Finding Vulnerable Devices and Detecting Attacks
BrandPost Extrahop

Ripple20: Finding Vulnerable Devices and Detecting Attacks

To enable all these features, please upgrade to the latest version of ExtraHop Reveal(x), 8.1.3.

How to Get Broader, Deeper MITRE Attack Coverage by Using EDR and NDR Together
BrandPost Extrahop

How to Get Broader, Deeper MITRE Attack Coverage by Using EDR and NDR Together

Network TTPs are critical for post-compromise, pre-breach detection & response

Gartner reports on handling challenges with TLS 1.3 and passive decryption
BrandPost Extrahop

Gartner reports on handling challenges with TLS 1.3 and passive decryption

Gartner takes a close look at security features, and in particular, the options available in cases where passive mode decryption is a requirement.

What’s Worse? RDP Open to the Internet or Closing Up Shop? RDP Best Practices to Follow in 2020
BrandPost Extrahop

What’s Worse? RDP Open to the Internet or Closing Up Shop? RDP Best Practices to Follow in 2020

Desperate times call for desperate measures, but you can still minimize risks.

ExtraHop Named in the 2020 Gartner Market Guide for UCaaS Monitoring
BrandPost Extrahop

ExtraHop Named in the 2020 Gartner Market Guide for UCaaS Monitoring

Unified Communications solutions have been integral to the enterprise for years, and as remote work becomes more common, the attack surface and potential for challenging performance issues increase with it.

Network Detection & Response vs. Network Traffic Analysis
BrandPost Extrahop

Network Detection & Response vs. Network Traffic Analysis

How does NDR relate to NTA in cybersecurity?

Most Security Pros Wish Their Company Did More Threat Hunting. Here’s How They Can.
BrandPost Extrahop

Most Security Pros Wish Their Company Did More Threat Hunting. Here’s How They Can.

Plus, we'll provide some clarity on what threat hunting actually *is*

With Cybersecurity Budgets Under Scrutiny, It’s Time to Get into Shape
BrandPost Extrahop

With Cybersecurity Budgets Under Scrutiny, It’s Time to Get into Shape

The current economic climate is an opportunity to re-architect your toolset for efficiency and effectiveness

New Research on Network Visibility and Threat Detection: A SANS Survey
BrandPost Extrahop

New Research on Network Visibility and Threat Detection: A SANS Survey

Detecting the threat from within: The need for greater east-west visibility

Insecure API Cloud Computing: The Causes & Solutions
BrandPost Extrahop

Insecure API Cloud Computing: The Causes & Solutions

There are a handful of best practices businesses should adopt to avoid accidental or malicious data exposure via APIs. Here are three.

Load More
Top Blog Posts