Category: Good Reads

Outranging HTTP.sys Range-Based Attacks, Trigger Style

April 17, 2015 | By Colin Walker | Add a Comment

If you’ve been watching the news in the tech space this week you’ve probably seen plenty going on in regards to HTTP.sys. A couple days ago ( April 15) a new CVE (Common Vulnerabilities and Exposures, the widely adopted place to track the bad things people are trying to do when they happen) was filed [...]

0

Continue Reading

The Step-by-Step Guide to Building Stellar ExtraHop Dashboards

April 9, 2015 | By Nojan Moshiri | Add a Comment

A custom dashboard built to track order fulfillment in a warehouse. In this post, we will show how to build a custom dashboard like this one. At a recent ExtraHop user forum, users asked for guidance in creating dashboards.  Here in the ExtraHop Technical Marketing Engineering (TME) group, we have a methodology that has helped [...]

0

Continue Reading

ExtraHop Top5: April 8, 2015

April 9, 2015 | By Colin Walker | Add a Comment

Welcome, intrepid reader, to the inaugural (read: first of many) ExtraHop Top5s. “But what is this greatness of which you speak?” you ask. The Top5 slices, it dices, it’ll even fold your laundry (Note: it cannot slice, dice, or fold anything in corporeal space). What it does best of all, though, is keep you up to date on [...]

0

Continue Reading

The Four Data Sets Essential for IT Operations Analytics (ITOA)

February 19, 2015 | By Erik Giesa | Add a Comment

[This is the second post in a four-part series. Read the first post: The Big Idea Behind IT Operations Analytics (ITOA): IT Big Data] In my previous article, I explained that IT Operations Analytics (ITOA) borrows from Big Data principles and that, in order to enable effective insights and data-driven decisions, you must first design [...]

0

Continue Reading

FTP Dashboard: Detect and Mitigate FTP Data Leaks

February 5, 2015 | By Steve Smith | Add a Comment

My name is Steve Smith, and I recently joined ExtraHop as an engineer on the technical marketing team. After spending a week playing with the ExtraHop platform, I decided it was time to take the training wheels off. From past experience, I was interested in the depth the ExtraHop platform could provide in tracking rogue [...]

0

Continue Reading

The Big Idea Behind IT Operations Analytics (ITOA): IT Big Data

February 5, 2015 | By Erik Giesa | Add a Comment

Gartner estimates that by 2017, approximately 15% of enterprises will actively use ITOA (IT Operations Analytics) technologies to provide insight into both business execution and IT operations, up from fewer than 5% today.[1] What’s driving this growth, and what do you need to know now in order to make sense of ITOA? Over the next [...]

0

Continue Reading

Turla Trojan Tactics Trounced

January 7, 2015 | By Colin Walker | Add a Comment

About a month or so back, just before the holiday stretch set in for many of us here in North America, Ars Technica put out an article depicting a new vector for Turla, namely a “Powerful, highly stealthy Linux trojan” that “may have infected victims for years.” I don’t know about you, but to me [...]

0

Continue Reading

Community: The Icing on Your ExtraHop & Why I’m Here

December 17, 2014 | By Colin Walker | 8 Comments

Some days I just frackin’ love what I do. Taking a figurative hammer to the metaphorical tough nut in the form of a complex problem and cracking that baby wide open is just plain fun. Getting to use wickedly cool technology to do so is just icing on the cake. Tasty, decadent icing. Whether it’s [...]

0

Continue Reading

Track the Entire Threat Lifecycle with ExtraHop + FireEye TAP

December 8, 2014 | By Chris Abella | Add a Comment

Visibility gets you many things: high-performing applications, faster remediation and, perhaps most importantly, peace of mind. That’s why we’re super excited to show off our recently announced partnership with the FireEye Threat Analytics Platform (TAP). Taking advantage of the ExtraHop Open Data Stream, we combine industry-leading security expertise from FireEye with the ExtraHop platform’s unprecedented [...]

0

Continue Reading

Detect and Track HTTP-based C&C Traffic for Backoff Malware

December 3, 2014 | By Mitchell Schwartz | Add a Comment

Roughly 1,000 retail companies have been impacted by the Backoff point-of-sale malware with costs related to data breaches totaling more than $150 million, according to a recent eWEEK article. If your organization relies on point-of-sale terminals, the best approach is to assume that your systems are already compromised and to look for malicious activity within [...]

0

Continue Reading