2024 Global Cyber Confidence Index

Arrow pointing right
ExtraHop Logo
  • Productschevron right
  • Solutionschevron right
  • Why ExtraHopchevron right
  • Blogchevron right
  • Resourceschevron right

Arrow pointing leftBlog

ExtraHop September TL;DR

A quick refresh of what you may have missed in cybersecurity for September

Paul Ditty

September 29, 2022

Welcome to the September edition of the ExtraHop TL;DR! This is your place to get the highlights on what we're talking about this month. You can also watch our video broadcasts on the fourth Friday of every month on our LinkedIn page.

Reveal Then Strike: NDR + EDR Stops Breaches Faster

ExtraHop and CrowdStrike together provide full-coverage security for when seconds matter. Inventory all IoT and unmanaged devices, detect network and endpoint attack behaviors, correlate threat intelligence, and automatically quarantine impacted devices to stop breaches faster.

Benchmarking Cyber Risk and Readiness Report

Gartner Hype Cycles provide a graphic representation of the maturity and adoption of technologies and applications, and explore how they are potentially relevant to solving real business problems and exploiting new opportunities. The emerging trends naturally toe the line between offering disparate data sources and diverse security tactics while streamlining, automating, or outsourcing the work of detection and response.

Reducing Cloud Security Friction in the C-Suite

When the subject of friction in the cloud comes up, it's often focused on security's effect on development. In this report, you'll learn about the real-world challenges cloud-focused security and IT teams face and gain takeaways to better help you understand the current state of friction in cloud security.

Customer Success: MEDHOST

MEDHOST's integrated product portfolio includes cloud-based clinical, financial, and operational solutions. Learn how they use Reveal(x) to protect their customers and patients.

Threat of the Month: SQL Injection (SQLi) Attack

A SQL injection is a common hacking technique which can compromise a database. By "injecting" an SQL command or code fragment into a legitimate data entry field (like a password field), attackers can use SQL to communicate directly with a database.

From the ExtraHop Blog

Take a look at some of our recent stories.

What is a Cloud Access Security Broker (CASB)?

Learn how CASBs function, how it compares to NDR, and discover how two solutions that are often viewed as competition can also work well together.

In Other News

Read, watch, or listen to some interesting news from around the internet.

Security Weekly Podcast: Cybersecurity is a Team Sport

Chase Snyder, Sr. Product Marketing Manager at ExtraHop, discusses why and how vendors should work together to enable better integrated security for their customers.

Dark Reading: Zero Trust Maturity Data

Every organization is on a zero-trust journey. Learn about how critical identity is to your security evolution, and how your organization can move forward.

Explore related articles

Experience RevealX NDR for Yourself

Schedule a demo