NEW

The True Cost of a Security Breach

Arrow pointing right
ExtraHop Logo
  • Productschevron right
  • Solutionschevron right
  • Why ExtraHopchevron right
  • Blogchevron right
  • Resourceschevron right

Arrow pointing leftBlog

Chase Snyder

Former Employee - Security Product Marketing Manager

About Chase

As a Sr. Product Marketing Manager at ExtraHop, Chase strives to extract the signal from the noise in the cybersecurity market, to provide security leaders and practitioners with information they can actually use to stay ahead of advanced persistent threats. Chase would never claim to be an expert at anything, but some topics he has above-average knowledge about include network detection and response, security operations, cryptography, and a grab bag of cybersecurity frameworks including NIST CSF, MITRE ATT&CK and D3FEND, and the CIS Top 20 controls.

Chase Snyder

Posts by this author

Software Supply Chain Attack vs. Supply Chain Vulnerability: What's The Difference?

August 4, 2022

What's the difference between an attack and a vulnerability? Not all software supply chain security issues are the same. Learn more.

Integrate EDR and NDR for Comprehensive MITRE ATT&CK Coverage

July 28, 2022

This blog outlines how network detection and response (NDR) and endpoint detection and response (EDR) complement each other's capabilities to provide broad, deep coverage of the MITRE ATT&CK Framework.

Five Blind Spots That Leave You Open to Supply Chain Vulnerabilities

June 2, 2022

Learn the top five undersecured software supply chain attack vectors, and how to gain the visibility you need to reduce supply chain risk.

Accelerate Cybersecurity Investigations with Reveal(x) Threat Briefings

January 27, 2022

Use correlated, contextualized data to simplify response times, helping you regain the advantage.

When They're Already Inside the Walls: How to Detect and Stop Lateral Movement

November 17, 2021

Attackers spend a lot of time moving laterally within your environment, trying to reach their targets. Detecting lateral movement can be a challenge, especially if they're using living-off-the-land techniques. Here's what you can do.

Secure Microsoft 365 with Reveal(x) 360 Network Detection and Response

October 13, 2021

Microsoft 365 integration is here, helping you detect and investigate threats to your Microsoft SaaS tools using ExtraHop Reveal(x) 360 network detection and response.

What is Mitre D3FEND?

August 20, 2021

Knowing an attacker's tactics and techniques is just the first step toward effective defense. Learn how the new MITRE D3FEND matrix takes the next step by documenting effective countermeasures.

ExtraHop is the Founding NDR Provider in the XDR Alliance

August 3, 2021

Exabeam has announced the XDR Alliance, a partnership of cybersecurity innovators, with ExtraHop as the alliance's founding member in the NDR category.

SIEM Alone Won't Stop Advanced Threats. Integrated NDR & SIEM Can. Here's Why.

July 29, 2021

Learn about the benefits of integrating NDR and SIEM to defend your organization against advanced threats.

ExtraHop Contributes Network Security Expertise to MITRE ATT&CK Framework

June 29, 2021

ExtraHop was the first NDR vendor to natively integrate MITRE ATT&CK into their interface. They're now the first to contribute to the ATT&CK framework.

Top 3 Trends from the 2021 Verizon DBIR

June 25, 2021

The Verizon 2021 Data Breach Investigations Report (DBIR) provides insights into cybersecurity trends. Read our top takeaways, plus cyberdefense tips.

Announcing Reveal(x) 360 NDR in the CrowdStrike App Store

May 26, 2021

ExtraHop Reveal(x) 360 is the first NDR app in the CrowdStrike app store. Learn how integrated EDR and NDR can catch and stop advanced attacks faster.

New eBook: Why the Time Is Right for Network and Security Collaboration

April 28, 2021

With accelerated cloud adoption, remote work, and increasingly advanced attacks, now is the time for network and security teams to collaborate.

The Ground Truth: Securing Remote Work with Collaborative NetSecOps

March 24, 2021

Distributed workforces aren't going anywhere. Learn about the challenges and opportunities in 2021 and beyond with NetOps and SecOps collaboration.

Where Does NDR Stand in the 2020 Gartner Hype Cycle for Security Operations?

February 19, 2021

The 2020 Gartner Hype Cycle for Security Operations shows NDR drawing near to the Slope of Enlightenment. Read the blog to learn more.

Behavior-Based Detection and Rule-Based Detection: Why Not Both?

February 12, 2021

Learn how ExtraHop Reveal(x) combines behavior-based detection and rule-based detection to provide a covert defense against advanced threats.

How to Respond to Incidents Quickly Despite Intentionally Confusing False Flags

September 4, 2020

False flags are deliberately planted details meant to distract or mislead investigators. Learn what to look out for and how to get more context.

Strange Behavior: The Case for Machine Learning in Cybersecurity

September 1, 2020

What is the use case for machine learning in cybersecurity? Detecting unusual behavior that other approaches miss. See how ExtraHop is using ML for NDR.

How To Monitor Sensitive Data & Stop Exfiltration via The Network

August 28, 2020

Learn how NDR can monitor sensitive data movement in the enterprise network to stop breaches and catch insider threats before they exfiltrate data.

How To Get a Complete Inventory of Devices on Your Network

August 20, 2020

Device inventory is vital to security, and is the first requirement of the CIS Top 20 security controls, but current inventory tech leaves huge blind spots. How can you get a better inventory without undue management hassle?

Remote Work Isn't Going Away. Here's How to Secure WFH For The Long Haul

July 28, 2020

After the rapid shift to remote work, it's time to look toward maintaining the security of work-from-home infrastructures for the long haul. A recent SANS study and accompanying webinar discuss how.

Gartner Report on Handling Challenges with TLS 1.3 and Passive Decryption

July 13, 2020

Learn how Gartner, in its in-depth report, delves into the options and trade-offs available to businesses as they consider the transition to TLS 1.3.

How Reveal(x) Network Detection & Response Makes MITRE ATT&CK Easier

July 2, 2020

Network detection and response (NDR) is a vital tool for broad, deep MITRE ATT&CK Framework coverage. This short post and three minute video shows how Reveal(x) integrates MITRE ATT&CK into threat investigations.

Cloud-Native NDR & EDR With CrowdStrike and ExtraHop

June 3, 2020

CrowdStrike and ExtraHop have partnered to provide integrated cloud-native NDR + EDR. Detect and respond to attacks while addressing new vulnerabilities.

What's Worse? RDP Open to the Internet or Closing Up Shop? RDP Best Practices to Follow in 2020

May 29, 2020

Enabling remote desktop protocol has been important to support work-from-home access in 2020. Read five best practices to follow for the RDP protocol.

Most Security Pros Wish Their Company Did More Threat Hunting. Here's How They Can.

April 22, 2020

Why is proactive threat hunting valuable but underused? Find out in the results of Cybersecurity Insiders' new threat hunting survey, and get strategies for your SOC.

ISC(2) Webcast: Using MITRE ATT&CK In Hybrid and Cloud Environments

March 18, 2020

This webinar addresses how to achieve greater security in cloud and hybrid environments using the MITRE ATT&CK Framework.

The ExtraHop Reveal(x) Demo: NDR At Your Fingertips

March 10, 2020

The online demo of ExtraHop Reveal(x) is completely free and ungated, putting you right in the product to hunt threats and investigate anomalies. Here's how (and why) we built it.

Threat Investigation Speed Run with ExtraHop Reveal(x)

March 2, 2020

Watch the 2-minute video to see how quickly security teams can detect, investigate, and resolve a threat like ransomware using ExtraHop Reveal(x).

Announcing ExtraHop Reveal(x) for Midsize Enterprises

February 11, 2020

Protect your midsize enterprise with affordable ExtraHop Reveal(x) subscription packages, plus Reveal(x) Advisor for security analyst support.

Network Detection & Response (NDR) for NIST

October 8, 2019

Learn how to use the NIST Cybersecurity Framework, and how network detection and response (NDR) with ExtraHop Reveal(x) can help.

How Decryption Helped Beat the Nazis

September 26, 2019

Learn about one of the key infosec lessons from WWII: message content matters. Here's why.

Network Detection & Response vs. Network Traffic Analysis

September 12, 2019

NDR products use NTA, but add historical data for investigations, threat hunting, and automated threat response.

How Orgs Should Approach Shadow IT (& How NDR Can Help)

August 26, 2019

Shadow IT is inevitable, but zero tolerance policies aren't the answer. Learn the smart, secure, and scalable approach to dealing with shadow IT.

2019 SANS SOC Survey Results

July 11, 2019

Learn how your SecOps peers are approaching threat-detection and response in the hybrid enterprise, and more!

How to Apply CIS Controls & MITRE ATT&CK in the Cloud

July 1, 2019

A crash course in how to solve the top 3 challenges you'll face in applying security control frameworks to the hybrid cloud.

What Is Cross-Site Scripting (XSS) & How To Prevent It

June 11, 2019

Cross-site scripting (XSS): Sketchy links from suspicious-looking emails or a shortened URL from your social feed can play a part in this security threat.

Basic Threat Hunting with Reveal(x)

April 29, 2019

Watch this 5-minute video to see how ExtraHop Reveal(x) network detection and response makes it simple to proactively search for and investigate potential threats like risky database and DNS activity.

Network Detection & Response for MITRE ATT&CK

April 11, 2019

The MITRE ATT&CK Framework helps security teams evaluate threat detection tools against real-world adversary tactics, techniques, and procedures (TTPs). Learn how network detection & response (NDR) tools like Reveal(x) detect more TTPs, faster, than other solutions.

Real Answers to Real Questions About AI

April 10, 2019

ExtraHop answers five of Gartner's recommended questions that CISOs should ask before adopting AI or, more accurately, machine learning.

Network Detection & Response (NDR) vs. SIEM

February 13, 2019

Network detection & response (NDR) vs. SIEM: What are the key differences, and how can these two security solutions work together for a proactive, cost-effective, and scalable SOC?

Network Detection & Response (NDR) vs. Intrusion Prevention Systems (IPS)

February 7, 2019

Compare network detection & response (NDR) products to traditional security solutions with this bakeoff between NDR and intrusion prevention systems (IPS).

Network Detection & Response (NDR) vs. Intrusion Detection Systems (IDS)

January 23, 2019

Learn how network detection & response (NDR) products compare to intrusion detection systems.

Network Traffic Analysis for Enterprise Security

October 5, 2018

Watch this 6 minute video to learn exactly what sets enterprise-class network traffic analysis products apart from the basic definition of the category and which capabilities are required to be truly best-of-breed.

DDoS Protection Primer: Types and Mitigation Explained

September 18, 2018

Get to know the latest about DDoS attacks by learning about attack types, mitigation strategies, and how to protect your website.

What Is Network Traffic Analysis (NTA)?

June 25, 2018

Learn Gartner's definition of network traffic analysis (NTA) and how this process relates to network detection and response (NDR) in enterprise cybersecurity.

SSL/Early TLS Is About to Violate PCI Compliance...

March 8, 2018

When the PCI Security Standards Council bans SSL/early TLS in June 2018, you'll need real-time network analytics to maintain compliance. Here's why.

What Is Dwell Time in Cyber Security?

December 18, 2017

Learn how dwell time in security can hurt your programs and find out how to be proactive to reduce dwell time.

The End of Briforum and the Future of Monitoring on Brian Madden's Penultimate Podcast

July 27, 2016

Listen in on a great conversation between virtualization legends Brian Madden and John Smith.

What Is The DROWN Attack/Vulnerability & Should I Be Worried?

March 1, 2016

A new vulnerability leaves up to 33% of websites open to attack. Get the basics on the DROWN attack in this quick FAQ.

Webinar: How to Use Big Data To Transform IT Operations

September 18, 2015

Join McKesson's Doug McMartin and ExtraHop CEO Jesse Rothstein for a discussion on the three primary challenges of IT Big Data

What Is Wire Data? (Video)

September 4, 2015

Take a minute and a half to learn what wire data is, and why it is the linchpin of successful IT operations analytics (ITOA).

What is FHIR (Fast Healthcare Interoperability Resources)?

August 27, 2015

Learn what FHIR is, how it relates to the HL7 protocol, and standards you should know about this way of exchanging healthcare information electronically.

Real-User Monitoring's Next Frontier: Context, Context, Context!

May 4, 2015

Data derived from traditional RUM solutions lacks context. ExtraHop merges RUM metrics from Boomerang.js with wire data insights for more relevant results.

Experience RevealX NDR for Yourself

Schedule a demo