Welcome to this edition of the ExtraHop TL;DR! This is your place to get the highlights on what we're talking about this month. You can also watch our video broadcasts on the third Friday of every month on our LinkedIn page.
Introducing Breakthrough Decryption for Microsoft Environments
Get high-fidelity decryption capabilities to detect a new class of advanced attacks—including 'living-off-the-land' and Active Directory Kerberos Golden Ticket attacks—that exploit proprietary Microsoft protocols to evade security controls and traditional monitoring tools like next-generation firewalls (NGFW) and web proxies.
Forensics Readiness Speeds Root Cause Analysis
Get a practical understanding of incident response, network forensics, and learn how to eradicate intruders and quickly recover your operations.
Defending Your Containerized Environments
Securing containers requires continuous monitoring, AI-powered analysis, and the ability to detect and respond to advanced threats as they occur. With ExtraHop Reveal(x) 360, you can unify security across containers and services in a single management pane.
Threat of the Month: Supply Chain Compromise
The supply chain doesn't only affect our shipping and delivery times. It also affects our network security. Learn how advanced attackers use the network's supply chain to infiltrate and create trouble for organizations.
From the ExtraHop Blog
Take a look at some of our recent stories.
Our IT Ops Director Gets Colorful in the Name of Tech Diversity
Bri Hatch, Sr. Director of IT Operations, recently raised over $31,000 for organizations committed to diversity in tech. All it took was a fantastic makeover.
Find Exploit Attempts Against the CISA Known Exploited Vulnerabilities
The Cybersecurity and Infrastructure Security Agency (CISA) recently issued a new directive for federal agencies, which may also serve as best practices for private organizations.
Bridging Data Retention Gaps En Route to Zero Trust
Change is rapidly underway for many government agencies and public sector organizations as they work to implement fresh zero trust mandates.
In Other News
Read, watch, or listen to some interesting news from around the internet.
Decrypt as if Your Security Depends on It
ExtraHop's Jamie Moles, Senior Technical Marketing Manager, joins Security Weekly to discuss the various techniques attackers are using encryption to cover their tracks.
SolarWinds Attacker Targets Cloud Service Providers
The Russia-based threat actor behind the SolarWinds supply chain attack is targeting cloud service providers and IT services organizations in a large-scale and ongoing campaign.