About
This bio was provided during this employee's time at ExtraHop and does not reflect any current positions or experience.
About Barbara
Barbara is the Senior Director of Security Product Marketing at ExtraHop. She brings years of experience in threat intelligence, data analytics, machine learning, and what makes an effective product and solution marketing strategy.
Posts
4.2.19
New EMA Research: Rapid, Risky Adoption of TLS 1.3
People are the weakest link in cybersecurity, but new research from EMA indicates rapid, risky adoption of advanced encryption like TLS 1.3. Here's what you need to know to implement TLS 1.3 safely.
Barbara Kay
3.4.19
First Gartner Market Guide for Network Traffic Analysis
Download a complimentary copy of Gartner's first NTA Market Guide, or gear up for the read with our top three takeaways including how security leaders should evaluate vendors and where the most exciting innovations are.
Barbara Kay
2.5.19
EMA Names Reveal(x) a Top 3 Winner
Why does Reveal(x) lead the pack on critical security use cases including asset classification and inventory, early breach detection, encrypted traffic analysis, and more? Learn why Enterprise Management Associates named Reveal(x) a Top 3 Winner in their new report, Security Analytics for Threat Detection and Breach Resolution in 2019.
Barbara Kay
1.15.19
Cybersecurity: Choosing ML over AI today for good reasons.
Are you jaded by the overuse of Artificial Intelligence (AI) – with vendors instilling either fear or faith? In the cybersecurity domain, we see CISOs investing in Machine Learning (ML), but remaining justifiably skeptical of AI. Here's why.
Barbara Kay
11.30.18
'Tis the Season to be... Breached?
The last week of November 2018 was a busy week for data breaches, with several major consumer-facing organizations all reporting major security incidents. What can we learn from these disclosures, and why does one stand so far apart from the rest?
Barbara Kay
10.4.18
Security Takeaways from Splunk .conf 2018
If you missed Splunk .conf 2018, read up on the top takeaways from the show including Splunk's importance to SOC teams, Phantom integrations, and more!
Barbara Kay
8.16.18
Three Top Takeaways from Black Hat 2018: Encryption, NTA, and the Irresistible Cloud
With another Black Hat come and gone, read this post for the top three takeaways SecOps needs to pay attention to, from encryption to NTA to the cloud.
Barbara Kay
8.3.18
ExtraHop Chosen as EMA's Network-Based Security Analytics Vendor to Watch and a Value Leader
Find out why ExtraHop's first security analytics release makes an "unprecedented jump into the Value Leaders corner" of EMA's radar.
Barbara Kay
7.31.18
Trendspotting in the 2018 Gartner Hype Cycle for Threat-Facing Technologies
What did Gartner predict in the 2018 Hype Cycle for Threat-Facing Technologies, and what are the most important changes from 2017? Take a look at this breakdown of the security tech to watch this year!
Barbara Kay
6.19.18
Survival of the Focused: How the Pareto Payoff Can Save Your SOC
ExtraHop Reveal(x) Summer 2018 sheds light on key risks and behaviors in the darkspace of enterprise security. Here's how Reveal(x) solves late-stage attack blindness.
Barbara Kay
5.22.18
Who's Within Your Firewall?
Opportunistic attacks are easy to block, but targeted and advanced attacks take a combo of time, skill, and an integrated security workflow. Learn how Palo Alto Networks and ExtraHop Reveal(x) work together to give you a shortcut for late stage threat hunting!
Barbara Kay
5.14.18
Have the Tears Dried Yet? WannaCry One Year Later
In May 2017, WannaCry shook the world in a massively effective ransomware attack affecting 150 countries. One year later, has the tech industry learned its lesson? Check out this CIO Dive interview with ExtraHop's VP of Security and 3 other security experts about what made WannaCry so successful, how the industry has evolved since, and what's next for cyber security and ransomware defense.
Barbara Kay
3.2.18
Malvertising 101: When You Become the Product
Learn how malvertising, or malware-advertising, works, plus steps to avoid becoming a victim.
Barbara Kay
12.13.17
Doxware: What, Why, and How to Stay Safe
Learn about doxware, including why it's becoming more and more popular to cyber criminals, and how to protect against a doxware attack.
Barbara Kay