The True Cost of a Security Breach

Arrow pointing right
ExtraHop Logo
  • Productschevron right
  • Solutionschevron right
  • Why ExtraHopchevron right
  • Blogchevron right
  • Resourceschevron right

Arrow pointing leftBlog

ExtraHop November TL;DR

A quick refresh of what you may have missed in cybersecurity for November

Paul Ditty

November 19, 2021

Welcome to this edition of the ExtraHop TL;DR! This is your place to get the highlights on what we're talking about this month. You can also watch our video broadcasts on the third Friday of every month on our LinkedIn page.

Introducing Breakthrough Decryption for Microsoft Environments

Get high-fidelity decryption capabilities to detect a new class of advanced attacks—including 'living-off-the-land' and Active Directory Kerberos Golden Ticket attacks—that exploit proprietary Microsoft protocols to evade security controls and traditional monitoring tools like next-generation firewalls (NGFW) and web proxies.

Forensics Readiness Speeds Root Cause Analysis

Get a practical understanding of incident response, network forensics, and learn how to eradicate intruders and quickly recover your operations.

Defending Your Containerized Environments

Securing containers requires continuous monitoring, AI-powered analysis, and the ability to detect and respond to advanced threats as they occur. With ExtraHop Reveal(x) 360, you can unify security across containers and services in a single management pane.

Threat of the Month: Supply Chain Compromise

The supply chain doesn't only affect our shipping and delivery times. It also affects our network security. Learn how advanced attackers use the network's supply chain to infiltrate and create trouble for organizations.

From the ExtraHop Blog

Take a look at some of our recent stories.

Our IT Ops Director Gets Colorful in the Name of Tech Diversity

Bri Hatch, Sr. Director of IT Operations, recently raised over $31,000 for organizations committed to diversity in tech. All it took was a fantastic makeover.

Find Exploit Attempts Against the CISA Known Exploited Vulnerabilities

The Cybersecurity and Infrastructure Security Agency (CISA) recently issued a new directive for federal agencies, which may also serve as best practices for private organizations.

Bridging Data Retention Gaps En Route to Zero Trust

Change is rapidly underway for many government agencies and public sector organizations as they work to implement fresh zero trust mandates.

In Other News

Read, watch, or listen to some interesting news from around the internet.

Decrypt as if Your Security Depends on It

ExtraHop's Jamie Moles, Senior Technical Marketing Manager, joins Security Weekly to discuss the various techniques attackers are using encryption to cover their tracks.

SolarWinds Attacker Targets Cloud Service Providers

The Russia-based threat actor behind the SolarWinds supply chain attack is targeting cloud service providers and IT services organizations in a large-scale and ongoing campaign.

Explore related articles

Experience RevealX NDR for Yourself

Schedule a demo