NEW

The True Cost of a Security Breach

Arrow pointing right
ExtraHop Logo
  • Productschevron right
  • Solutionschevron right
  • Why ExtraHopchevron right
  • Blogchevron right
  • Resourceschevron right

Arrow pointing leftBlog

Carol Caley

Former Employee - Content Writer

About Carol

Carol is a cybersecurity writer and content nerd at ExtraHop.

Posts by this author

Reducing Cloud Security Friction in the C-Suite E-Book

March 1, 2022

Learn the most common threats to cloud security and get a primer on available cloud security solutions.

MeriTalk: Ransomware Tops U.S. Security Agenda

August 13, 2021

A recent MeriTalk white paper explores how the Colonial Pipeline hack has pushed ransomware to the top of the U.S. security agenda.

SANS on Defining and Measuring Cybersecurity Visibility

July 26, 2021

Visibility is necessary for security but the concept isn't exactly clear-cut. Hear from SANS on defining visibility to help you confidently identify blind spots, strengthen security, and measure success on this cybersecurity KPI.

Three Common Advanced Threats and How to Stop Them

July 9, 2021

Advanced persistent threats, supply chain attacks, and zero days are becoming more prevalent. A new white paper explores each threat, how they overlap, and how to detect them before they cause damage.

Podcast: NDR, EDR, and Implementing Zero Trust

May 17, 2021

John Kindervag, credited as the creator of zero trust, sat down to talk about zero trust implementation and how security solutions can support it.

Podcast: NDR, EDR & Implementing Zero Trust

May 17, 2021

John Kindervag, credited as the creator of zero trust, sat down to talk about zero trust implementation and how security solutions can support it.

Insecure Protocols: SMBv1, LLMNR, NTLM, and HTTP

May 12, 2021

Learn what to do to protect your organization from the vulnerable protocols that enabled attacks such as WannaCry ransomware: SMBv1, LLMNR, NTLM, and HTTP.

From the FBI to the Private Sector: What Mark Bowling Has Learned About Cybersecurity

May 6, 2021

Mark Bowling brings thirty years of cybersecurity and intelligence expertise to ExtraHop, including time working at the FBI and the Department of Education. Read on for his answers to our top five questions.

New Report: How SUNBURST Used DNS to Avoid Detection

April 26, 2021

A new report details how hiding in DNS traffic was a critical tactic used by SUNBURST attackers to avoid detection—and why DNS is so challenging to secure.

Gartner Includes NDR as One of the Controls Against SUNBURST

March 23, 2021

In a recent blog post, Gartner lists network detection and response (NDR) as one of the controls necessary to thwart supply chain attacks. Learn more.

There's a Better Way to Monitor DNS

March 18, 2021

Well-known cyberattacks take advantage of DNS to evade common security tools. Learn how these attacks work, and how to monitor DNS traffic for threats.

Scanning for DNS

March 11, 2021

Most people don't think of brick-and-mortar retail stores as technology centers, but as one Big Box retailer discovered, even grocery scanners can pose a cybersecurity risk. Read this story of detecting suspicious DNS behavior.

ExtraHop's CRN Channel Chiefs on Building Opportunities for Partners

February 12, 2021

Read a Q+A with ExtraHop's two CRN Channel Chiefs, Mark Fitzmaurice, Vice President of Worldwide Channel Sales, and Todd Debell, Director of Channels for the Americas.

New Report on Lessons Learned Observing SUNBURST's Behavior

February 11, 2021

Get ExtraHop's latest report exploring how SUNBURST's behavior evaded defenses and what we can do going forward.

SANS Review: Taking on Modern Threats

January 26, 2021

In this SANS review of ExtraHop Reveal(x) network detection and response, Dave Shackleford discusses it's intuitive design and usability.

LDAP Encryption: What You Need to Know in 2024

January 1, 2021

Secure your LDAP traffic in 2024: Learn how encryption shields sensitive data. Explore LDAP encryption FAQs for strong cybersecurity.

Paving the Way for Secure DevOps in the Cloud

December 8, 2020

SANS conducted their annual DevOps survey, seeking to understand whether or not security teams are able to keep pace with DevOps. They concluded that shifting security earlier in the process is a smart strategy for faster deployment.

Folding@home for COVID-19 Research

December 4, 2020

A team of ExtraHoppers has made it into the top 800 in Folding@home, a competitive distributed computing project aiming to better understand COVID-19.

Why Network Detection and Response Belongs in Your 2021 Strategy

November 11, 2020

With 2021 quickly approaching, it's time to think critically about what's working in your security strategy and what could stand to improve. ExtraHop's Mike Campfield joined Enterprise Security Weekly to discuss why network detection and response is critical to the future of security.

Gartner Report: Threat Hunting for Threat Protection

October 23, 2020

Threat hunting is a way for advanced security operations teams to proactively seek out and eliminate threats in their environment. This Gartner report explores the potential benefits of threat hunting.

The Feeling is Mutual: Security Solution Reviews for ExtraHop Reveal(x)

October 14, 2020

ExtraHop Reveal(x) customers have shared their experiences, ensuring that ExtraHop ranks as a top service provider on Gartner's Peer Insights in the Network Detection and Response market. We can't thank them enough.

Cloud-Native NDR: Shared Responsibility's Missing Link

October 7, 2020

(ISC)² has launched a three-part webinar series on how cloud-native network detection and response helps enterprises uphold their end of the shared responsibility model, while offering the same scalability that other cloud services offer.

SANS on Building Effective SOC Teams Despite the Skills Gap

August 26, 2020

A recent SANS survey found that, because of budget limitations, more companies are reconsidering their security staff hiring. Given that necessary skills are still in demand, Security Operations Managers will need to take a different approach to bridge the gap.

Longread: Should You Use Zoom?

May 15, 2020

Now that business (and your social life) runs on Zoom, what are the security issues that have plagued the video conferencing giant—and how serious are they, really? Read the blog for a breakdown.

The Packet Pushers Weigh In on ExtraHop IoT Monitoring Capabilities

March 10, 2020

Get the podcast for the news in IT and listen for a mention of ExtraHop's new IoT capabilities.

EDR Security: The Landscape in 2020

January 3, 2020

What is endpoint detection and response (EDR) security? Read more about the EDR landscape for 2020 and beyond.

Experience RevealX NDR for Yourself

Schedule a demo