The True Cost of a Security Breach

Arrow pointing right
ExtraHop Logo
  • Productschevron right
  • Solutionschevron right
  • Why ExtraHopchevron right
  • Blogchevron right
  • Resourceschevron right

Arrow pointing leftBlog

ExtraHop September TL;DR

A quick refresh of what you may have missed in cybersecurity for September

Paul Ditty

September 24, 2021

Welcome to the first edition of the ExtraHop Tl;DR! This is your place to get the highlights on what we're talking about this month. You can also get these stories sent to your inbox or watch our video broadcasts every third Friday on our LinkedIn page.

Gartner Quick Answer: How to Respond to a Supply Chain Attack

Do you have trust issues? With the rise of advanced attacks, it's important to stay prepared and to know who's on your network. In this report, Gartner explains how to build an incident response plan to deal with supply chain attacks.

Supply Chain Global Risk and Financial Services

The complexity of the software supply chain increases risk for any organization, and as we have learned from SUNBURST, these attacks are stealthy and destructive. This industry report focuses on financial services and the increased operational challenges brought on by the pandemic. Learn how complete network visibility helps your business take back the advantage.

ExtraHop Reveal(x) 360 for Education

It's September, and many kids are heading back to school. As parents worry about health risks in a pandemic, administrators are concerned with ransomware attacks which increased 100 percent from 2019 to 2020. This spike can be partially attributed to the rise of remote access for online learning with untrained users and strained IT resources. This solution brief teaches us that schools can maintain future remote education while improving their security posture.

The Tricks and Treats of Cybersecurity

It's almost October, which means Halloween and Cybersecurity Awareness Month. To celebrate both, we're passing out a few treats in exchange for your spookiest, most action-packed cybersecurity ghost story. Thrill us with the threats that have haunted your network or wow us with a story of triumph. You could win a great prize!

From the ExtraHop Blog

Take a look at some of our recent stories.

How ExtraHop Shut Down a C&C Beaconing Attack

Seemingly harmless print servers can become targets of all sorts of threat activity. Learn how an attack was shut down when ExtraHop Reveal(x) detected suspicious activity in a compromised print server, leading to the discovery of C&C beaconing.

On the Lookout for Credential-Sharing Gaps

When it comes to credentials, a strong password for your username is useless if you send them across your network in the clear. Without encryption, you're basically handing over your credentials to hackers. The good news is that there are actions you can take to secure your network.

In Other News

Read, watch, or listen to some interesting news from around the internet.

Increasingly, Cyber Resiliency Depends upon Zero Trust Implementation

Dark Reading recently published a story on this year's ransomware spike, and as security teams embrace new tools, they also need to keep an eye out for new attack vectors.

Putting the "R" in NDR

ExtraHop's Principal Engineer, John Smith, joined Security Weekly to discuss why incident response should consist of threat hunting, investigating, and remediation.

Experience RevealX NDR for Yourself

Schedule a demo