Posts
8.4.22
Software Supply Chain Attack vs. Supply Chain Vulnerability: What's The Difference?
7.28.22
Integrate EDR and NDR for Comprehensive MITRE ATT&CK Coverage
6.2.22
Five Blind Spots That Leave You Open to Supply Chain Vulnerabilities
1.27.22
Accelerate Cybersecurity Investigations with Reveal(x) Threat Briefings
11.17.21
When They're Already Inside the Walls: How to Detect and Stop Lateral Movement
10.13.21
Secure Microsoft 365 with Reveal(x) 360 Network Detection and Response
8.20.21
What is Mitre D3FEND?
8.3.21
ExtraHop is the Founding NDR Provider in the XDR Alliance
7.29.21
SIEM Alone Won't Stop Advanced Threats. Integrated NDR & SIEM Can. Here's Why.
6.29.21
ExtraHop Contributes Network Security Expertise to MITRE ATT&CK Framework
6.25.21
Top 3 Trends from the 2021 Verizon DBIR
5.26.21
Announcing Reveal(x) 360 NDR in the CrowdStrike App Store
4.28.21
New eBook: Why the Time Is Right for Network and Security Collaboration
4.22.21
A Multinational Retailer Combats Advanced Attacks with ExtraHop and CrowdStrike
3.24.21
The Ground Truth: Securing Remote Work with Collaborative NetSecOps
2.19.21
Where Does NDR Stand in the 2020 Gartner Hype Cycle for Security Operations?
2.12.21
Behavior-Based Detection and Rule-Based Detection: Why Not Both?
9.4.20
How to Respond to Incidents Quickly Despite Intentionally Confusing False Flags
9.1.20
Strange Behavior: The Case for Machine Learning in Cybersecurity
8.28.20
How To Monitor Sensitive Data & Stop Exfiltration via The Network
8.20.20
How To Get a Complete Inventory of Devices on Your Network
7.28.20
Remote Work Isn't Going Away. Here's How to Secure WFH For The Long Haul
7.13.20
Gartner Report on Handling Challenges with TLS 1.3 and Passive Decryption
7.2.20
How Reveal(x) Network Detection & Response Makes MITRE ATT&CK Easier
6.3.20
Cloud-Native NDR & EDR With CrowdStrike and ExtraHop
5.29.20
What's Worse? RDP Open to the Internet or Closing Up Shop? RDP Best Practices to Follow in 2020
4.22.20
Most Security Pros Wish Their Company Did More Threat Hunting. Here's How They Can.
3.18.20
ISC(2) Webcast: Using MITRE ATT&CK In Hybrid and Cloud Environments
3.10.20
The ExtraHop Reveal(x) Demo: NDR At Your Fingertips
3.2.20
Threat Investigation Speed Run with ExtraHop Reveal(x)
2.11.20
Announcing ExtraHop Reveal(x) for Midsize Enterprises
10.8.19
Network Detection & Response (NDR) for NIST
10.2.19
Video Feature Short: On-Demand Executive Report
9.26.19
How Decryption Helped Beat the Nazis
9.12.19
Network Detection & Response vs. Network Traffic Analysis
8.26.19
How Orgs Should Approach Shadow IT (& How NDR Can Help)
7.29.19
Why Are Enterprises Enabling TLS 1.3 Encryption?
7.11.19
2019 SANS SOC Survey Results
7.1.19
How to Apply CIS Controls & MITRE ATT&CK in the Cloud
7.1.19
SANS Webinar - Network Detection & Response (NDR) Meets MITRE ATT&CK
7.1.19
SCMedia Webinar: Accelerating Incident Response through Network Traffic Analysis
6.11.19
What Is Cross-Site Scripting (XSS) & How To Prevent It
4.29.19
Basic Threat Hunting with Reveal(x)
4.11.19
Network Detection & Response for MITRE ATT&CK
4.10.19
Real Answers to Real Questions About AI
3.27.19
Boost SOC Analyst Productivity with Reveal(x) Spring '19
3.22.19
Case Study: Proactive Security Hygiene in a Hybrid Enterprise
3.22.19
Improve Threat Hunting & IR with NTA: ISC2 Briefing
3.22.19
ISC2 Security Briefing: Getting More Value from SecOps Frameworks
2.13.19
Network Detection & Response (NDR) vs. SIEM
2.7.19
Network Detection & Response (NDR) vs. Intrusion Prevention Systems (IPS)
1.24.19
Feature Short: Cyber Hygiene & Encryption Audit
1.23.19
Network Detection & Response (NDR) vs. Intrusion Detection Systems (IDS)
1.16.19
Reveal(x) Winter 2019 Sounds the Klaxon
11.7.18
Reveal(x) Feature Short: Signal Metrics
10.31.18
Reveal(x) Feature Short: Threat Intelligence
10.25.18
Five Reasons You Need to Decrypt Traffic for SecOps Analysis
10.15.18
Reveal(x) Feature Short: Investigation
10.5.18
Network Traffic Analysis for Enterprise Security
10.1.18
Signal From Noise: ExtraHop Reveal(x) Signal Metrics
9.18.18
DDoS Protection Primer: Types and Mitigation Explained
8.14.18
The SANS 2018 SOC Survey Results Are In!
8.2.18
Answer InfoSec Questions on Twitter - Win Night Vision Goggles at Black Hat!
6.25.18
What Is Network Traffic Analysis (NTA)?
6.19.18
What's Under The Hood of Reveal(x) Summer 2018
6.12.18
INFOGRAPHIC - SecOps Face Off
6.6.18
Unpacking the Looming Challenge of Encryption Inside the Enterprise: Part 2
5.23.18
Unpacking The Looming Challenge of Encryption Inside The Enterprise: Part 1
4.27.18
The Top 3 Takeaways from RSA 2018
12.18.17
What Is Dwell Time in Cyber Security?
11.16.16
The NSA Doesn't Need Zero-Days to Crack Your Network
8.9.16
Automating Ransomware Prevention with ExtraHop and Citrix Octoblu
8.4.16
Customer Testimonial Video Series: "Total Visibility with a Single Monitoring Platform"
8.3.16
Webinar: Ransomware and How to Stop It
7.27.16
The End of Briforum and the Future of Monitoring on Brian Madden's Penultimate Podcast
7.20.16
VIDEO: ExtraHop Enables Seamless IT Operations at Phoenix Children's Hospital
7.5.16
Survey: The 7 Biggest Hurdles for IT Teams Implementing Big Data (And How to Get Past Them)
6.23.16
VIDEO: Keeping Paychecks On-Time at The Department of Veterans Affairs
6.21.16
Video: ExtraHop Co-Founder Talks iPhone Hacking & IT Visibility at Infosecurity Europe
6.8.16
Mobile Carrier Replaces 20 Troubleshooting Tools with a Single Monitoring Platform
4.26.16
How to Dodge the Microservices Tax
3.15.16
Three Reasons to Meet ExtraHop At An Upcoming VMUG
2.16.16
The NSA's Worst Nightmare
2.8.16
How Much Data Does The Super Bowl Create?
1.6.16
Live Wire, The Next Dimension for Streaming Analytics [WEBINAR]
1.4.16
Q&A: The Key to Healthcare Big Data Analytics
10.1.15
Happy ICD-10 Day! Here's Some Required Reading for a Smooth Switch
9.4.15
What Is Wire Data? (Video)
8.27.15
What is FHIR (Fast Healthcare Interoperability Resources)?
6.5.15
ITOA Spotlight: Turning IT Into a Profit Center
5.4.15