
BrandPost Sponsored by Extrahop
Origin Story Part 2: A Forensic Examination of SUNBURST After Detection
How to improve threat protection based on an analysis of the large-scale, SolarWinds Orion SUNBURST attack.

BrandPost Sponsored by Extrahop
Behavior-based Detection and Rule-based Detection: Why Not Both?
Sophisticated cybersecurity attackers require a sophisticated network approach to protect the organization.

BrandPost Sponsored by Extrahop
What’s the State of Hybrid and Cloud Security Tools?
Security and IT professionals share their experiences with existing data/workload challenges and the security tools they’re using.

BrandPost Sponsored by Extrahop
Threat Intel: Analyzing the SolarWinds Attack
Dissection of the recent SUNBURST attack campaign provides crucial threat intelligence for strategic action.

BrandPost Sponsored by Extrahop
Analyzing a Supply Chain Attack to Improve Threat Protection
As supply chain attacks increase in sophistication, there are lessons to be learned from the Solar Winds SUNBURST incident.

BrandPost Sponsored by Extrahop
Why Supply Chain Attacks Are So Destructive
Attackers are increasing their dwell time and damage using sophistication and stealth.

BrandPost Sponsored by Extrahop
Strange Behavior: The Case for Machine Learning in Cybersecurity
Sophisticated anomaly detection is the real benefit of ML.

BrandPost Sponsored by Extrahop
How to Monitor Sensitive Data and Stop Exfiltration via the Network
Status quo mechanisms for monitoring sensitive data movement and stopping breaches aren't working.

BrandPost Sponsored by Extrahop
Remote Work Isn't Going Away. Here's How to Secure WFH For The Long Haul
Listen in as ExtraHop engineers and partners explore how to secure their remote workforces without succumbing to changing security risks.

BrandPost Sponsored by Extrahop
SIGRed: What Is It, How Serious Is It, and How Should You Respond?
Understanding the Microsoft DNS SIGRed Vulnerability CVE-2020-1350

BrandPost Sponsored by Extrahop
Ripple20: Finding Vulnerable Devices and Detecting Attacks
To enable all these features, please upgrade to the latest version of ExtraHop Reveal(x), 8.1.3.

BrandPost Sponsored by Extrahop
How to Get Broader, Deeper MITRE Attack Coverage by Using EDR and NDR Together
Network TTPs are critical for post-compromise, pre-breach detection & response

BrandPost Sponsored by Extrahop
Gartner reports on handling challenges with TLS 1.3 and passive decryption
Gartner takes a close look at security features, and in particular, the options available in cases where passive mode decryption is a requirement.

BrandPost Sponsored by Extrahop
What’s Worse? RDP Open to the Internet or Closing Up Shop? RDP Best Practices to Follow in 2020
Desperate times call for desperate measures, but you can still minimize risks.

BrandPost Sponsored by Extrahop
ExtraHop Named in the 2020 Gartner Market Guide for UCaaS Monitoring
Unified Communications solutions have been integral to the enterprise for years, and as remote work becomes more common, the attack surface and potential for challenging performance issues increase with it.

BrandPost Sponsored by Extrahop
Network Detection & Response vs. Network Traffic Analysis
How does NDR relate to NTA in cybersecurity?

BrandPost Sponsored by Extrahop
Most Security Pros Wish Their Company Did More Threat Hunting. Here’s How They Can.
Plus, we'll provide some clarity on what threat hunting actually *is*

BrandPost Sponsored by Extrahop
With Cybersecurity Budgets Under Scrutiny, It’s Time to Get into Shape
The current economic climate is an opportunity to re-architect your toolset for efficiency and effectiveness

BrandPost Sponsored by Extrahop
New Research on Network Visibility and Threat Detection: A SANS Survey
Detecting the threat from within: The need for greater east-west visibility

BrandPost Sponsored by Extrahop
Insecure API Cloud Computing: The Causes & Solutions
There are a handful of best practices businesses should adopt to avoid accidental or malicious data exposure via APIs. Here are three.