Security

Blog Categories:

Cybercriminals upped their game, so we're upping ours (and yours.) Learn how to detect and stop ransomware automatically.

The DoD needed an innovative approach to address chronic issues in their Electronic Health Records systems. ExtraHop got the call.

We use four detection methods to provide early warning so IT teams can stop ransomware attacks in progress before the damage is done. The methods are...

For intelligence, surveillance, and reconnaissance, we need open, modular cybersecurity systems and platforms.

Why the fundamental building blocks of future security systems will involve platforms.

Forcing a customer to prove their eligibility for support before helping them is wrong. The first question a support engineer asks you on the phone should be...

Ransomware has changed network security. Read why you need to change... or update your resume.

Mapping the cyber terrain for decision superiority while protecting key information and resources.

An NSA honcho spoke out about how to stop the NSA from breaching your network. Here's what he said.

Your credit cards. Your medical records. Your fingerprints. The worst data breaches of 2015 didn't just hurt businesses, they ruined lives.

Dr. Ken Pickles shares his chaotic journey to his new role as head Chaos Engineer & destroyer of worlds at ExtraHop Networks.

Eric Sharpsten, CTO of Lockheed Martin's Federal Health practice, discusses how his organization gains visibility in large, dynamic IT environments.