About
This bio was provided during this employee's time at ExtraHop and does not reflect any current positions or experience.
About Chase
As a Sr. Product Marketing Manager at ExtraHop, Chase strives to extract the signal from the noise in the cybersecurity market, to provide security leaders and practitioners with information they can actually use to stay ahead of advanced persistent threats. Chase would never claim to be an expert at anything, but some topics he has above-average knowledge about include network detection and response, security operations, cryptography, and a grab bag of cybersecurity frameworks including NIST CSF, MITRE ATT&CK and D3FEND, and the CIS Top 20 controls.
Posts
8.4.22
Software Supply Chain Attack vs. Supply Chain Vulnerability: What's The Difference?
What's the difference between an attack and a vulnerability? Not all software supply chain security issues are the same. Learn more.
Chase Snyder
7.28.22
Integrate EDR and NDR for Comprehensive MITRE ATT&CK Coverage
This blog outlines how network detection and response (NDR) and endpoint detection and response (EDR) complement each other's capabilities to provide broad, deep coverage of the MITRE ATT&CK Framework.
Chase Snyder
6.2.22
Five Blind Spots That Leave You Open to Supply Chain Vulnerabilities
Learn the top five undersecured software supply chain attack vectors, and how to gain the visibility you need to reduce supply chain risk.
Chase Snyder
1.27.22
Accelerate Cybersecurity Investigations with Reveal(x) Threat Briefings
Use correlated, contextualized data to simplify response times, helping you regain the advantage.
Chase Snyder
11.17.21
When They're Already Inside the Walls: How to Detect and Stop Lateral Movement
Attackers spend a lot of time moving laterally within your environment, trying to reach their targets. Detecting lateral movement can be a challenge, especially if they're using living-off-the-land techniques. Here's what you can do.
Chase Snyder
10.13.21
Secure Microsoft 365 with Reveal(x) 360 Network Detection and Response
Microsoft 365 integration is here, helping you detect and investigate threats to your Microsoft SaaS tools using ExtraHop Reveal(x) 360 network detection and response.
Chase Snyder
8.20.21
What is Mitre D3FEND?
Knowing an attacker's tactics and techniques is just the first step toward effective defense. Learn how the new MITRE D3FEND matrix takes the next step by documenting effective countermeasures.
Chase Snyder
8.3.21
ExtraHop is the Founding NDR Provider in the XDR Alliance
Exabeam has announced the XDR Alliance, a partnership of cybersecurity innovators, with ExtraHop as the alliance's founding member in the NDR category.
Chase Snyder
7.29.21
SIEM Alone Won't Stop Advanced Threats. Integrated NDR & SIEM Can. Here's Why.
Learn about the benefits of integrating NDR and SIEM to defend your organization against advanced threats.
Chase Snyder
6.29.21
ExtraHop Contributes Network Security Expertise to MITRE ATT&CK Framework
ExtraHop was the first NDR vendor to natively integrate MITRE ATT&CK into their interface. They're now the first to contribute to the ATT&CK framework.
Chase Snyder
6.25.21
Top 3 Trends from the 2021 Verizon DBIR
The Verizon 2021 Data Breach Investigations Report (DBIR) provides insights into cybersecurity trends. Read our top takeaways, plus cyberdefense tips.
Chase Snyder
5.26.21
Announcing Reveal(x) 360 NDR in the CrowdStrike App Store
ExtraHop Reveal(x) 360 is the first NDR app in the CrowdStrike app store. Learn how integrated EDR and NDR can catch and stop advanced attacks faster.
Chase Snyder
4.28.21
New eBook: Why the Time Is Right for Network and Security Collaboration
With accelerated cloud adoption, remote work, and increasingly advanced attacks, now is the time for network and security teams to collaborate.
Chase Snyder
3.24.21
The Ground Truth: Securing Remote Work with Collaborative NetSecOps
Distributed workforces aren't going anywhere. Learn about the challenges and opportunities in 2021 and beyond with NetOps and SecOps collaboration.
Chase Snyder
2.19.21
Where Does NDR Stand in the 2020 Gartner Hype Cycle for Security Operations?
The 2020 Gartner Hype Cycle for Security Operations shows NDR drawing near to the Slope of Enlightenment. Read the blog to learn more.
Chase Snyder
2.12.21
Behavior-Based Detection and Rule-Based Detection: Why Not Both?
Learn how ExtraHop Reveal(x) combines behavior-based detection and rule-based detection to provide a covert defense against advanced threats.
Chase Snyder
9.4.20
How to Respond to Incidents Quickly Despite Intentionally Confusing False Flags
False flags are deliberately planted details meant to distract or mislead investigators. Learn what to look out for and how to get more context.
Chase Snyder
9.1.20
Strange Behavior: The Case for Machine Learning in Cybersecurity
What is the use case for machine learning in cybersecurity? Detecting unusual behavior that other approaches miss. See how ExtraHop is using ML for NDR.
Chase Snyder
8.28.20
How To Monitor Sensitive Data & Stop Exfiltration via The Network
Learn how NDR can monitor sensitive data movement in the enterprise network to stop breaches and catch insider threats before they exfiltrate data.
Chase Snyder
8.20.20
How To Get a Complete Inventory of Devices on Your Network
Device inventory is vital to security, and is the first requirement of the CIS Top 20 security controls, but current inventory tech leaves huge blind spots. How can you get a better inventory without undue management hassle?
Chase Snyder
7.28.20
Remote Work Isn't Going Away. Here's How to Secure WFH For The Long Haul
After the rapid shift to remote work, it's time to look toward maintaining the security of work-from-home infrastructures for the long haul. A recent SANS study and accompanying webinar discuss how.
Chase Snyder
7.13.20
Gartner Report on Handling Challenges with TLS 1.3 and Passive Decryption
Learn how Gartner, in its in-depth report, delves into the options and trade-offs available to businesses as they consider the transition to TLS 1.3.
Chase Snyder
7.2.20
How Reveal(x) Network Detection & Response Makes MITRE ATT&CK Easier
Network detection and response (NDR) is a vital tool for broad, deep MITRE ATT&CK Framework coverage. This short post and three minute video shows how Reveal(x) integrates MITRE ATT&CK into threat investigations.
Chase Snyder
6.3.20
Cloud-Native NDR & EDR With CrowdStrike and ExtraHop
CrowdStrike and ExtraHop have partnered to provide integrated cloud-native NDR + EDR. Detect and respond to attacks while addressing new vulnerabilities.
Chase Snyder
5.29.20
What's Worse? RDP Open to the Internet or Closing Up Shop? RDP Best Practices to Follow in 2020
Enabling remote desktop protocol has been important to support work-from-home access in 2020. Read five best practices to follow for the RDP protocol.
Chase Snyder
4.22.20
Most Security Pros Wish Their Company Did More Threat Hunting. Here's How They Can.
Why is proactive threat hunting valuable but underused? Find out in the results of Cybersecurity Insiders' new threat hunting survey, and get strategies for your SOC.
Chase Snyder
3.18.20
ISC(2) Webcast: Using MITRE ATT&CK In Hybrid and Cloud Environments
This webinar addresses how to achieve greater security in cloud and hybrid environments using the MITRE ATT&CK Framework.
Chase Snyder
3.10.20
The ExtraHop Reveal(x) Demo: NDR At Your Fingertips
The online demo of ExtraHop Reveal(x) is completely free and ungated, putting you right in the product to hunt threats and investigate anomalies. Here's how (and why) we built it.
Chase Snyder
3.2.20
Threat Investigation Speed Run with ExtraHop Reveal(x)
Watch the 2-minute video to see how quickly security teams can detect, investigate, and resolve a threat like ransomware using ExtraHop Reveal(x).
Chase Snyder
2.11.20
Announcing ExtraHop Reveal(x) for Midsize Enterprises
Protect your midsize enterprise with affordable ExtraHop Reveal(x) subscription packages, plus Reveal(x) Advisor for security analyst support.
Chase Snyder
10.8.19
Network Detection & Response (NDR) for NIST
Learn how to use the NIST Cybersecurity Framework, and how network detection and response (NDR) with ExtraHop Reveal(x) can help.
Chase Snyder
10.2.19
Video Feature Short: On-Demand Executive Report
Watch the 3-min video to learn how ExtraHop Reveal(x) delivers day-one attack surface auditing and makes it easy to report useful security data to the SOC manager, CISO, or even the board.
Chase Snyder
9.26.19
How Decryption Helped Beat the Nazis
Learn about one of the key infosec lessons from WWII: message content matters. Here's why.
Chase Snyder
9.12.19
Network Detection & Response vs. Network Traffic Analysis
NDR products use NTA, but add historical data for investigations, threat hunting, and automated threat response.
Chase Snyder
8.26.19
How Orgs Should Approach Shadow IT (& How NDR Can Help)
Shadow IT is inevitable, but zero tolerance policies aren't the answer. Learn the smart, secure, and scalable approach to dealing with shadow IT.
Chase Snyder
7.29.19
Why Are Enterprises Enabling TLS 1.3 Encryption?
If your enterprises is rushing to adopt TLS 1.3, read this infographic for the most important tips and cautions from Enterprise Management Association's latest research.
Chase Snyder
7.11.19
2019 SANS SOC Survey Results
Learn how your SecOps peers are approaching threat-detection and response in the hybrid enterprise, and more!
Chase Snyder
7.1.19
How to Apply CIS Controls & MITRE ATT&CK in the Cloud
A crash course in how to solve the top 3 challenges you'll face in applying security control frameworks to the hybrid cloud.
Chase Snyder
7.1.19
SANS Webinar - Network Detection & Response (NDR) Meets MITRE ATT&CK
A technical briefing on how network detection and response complements endpoint security and log analysis for achieving greater coverage of MITRE ATT&CK for Enterprise
Chase Snyder
7.1.19
SCMedia Webinar: Accelerating Incident Response through Network Traffic Analysis
A thirty-minute briefing on how incident response teams can use the network as their most valuable data source for accelerated IR workflows.
Chase Snyder
6.11.19
What Is Cross-Site Scripting (XSS) & How To Prevent It
Cross-site scripting (XSS): Sketchy links from suspicious-looking emails or a shortened URL from your social feed can play a part in this security threat.
Chase Snyder
4.29.19
Basic Threat Hunting with Reveal(x)
Watch this 5-minute video to see how ExtraHop Reveal(x) network detection and response makes it simple to proactively search for and investigate potential threats like risky database and DNS activity.
Chase Snyder
4.11.19
Network Detection & Response for MITRE ATT&CK
The MITRE ATT&CK Framework helps security teams evaluate threat detection tools against real-world adversary tactics, techniques, and procedures (TTPs). Learn how network detection & response (NDR) tools like Reveal(x) detect more TTPs, faster, than other solutions.
Chase Snyder
4.10.19
Real Answers to Real Questions About AI
ExtraHop answers five of Gartner's recommended questions that CISOs should ask before adopting AI or, more accurately, machine learning.
Chase Snyder
3.27.19
Boost SOC Analyst Productivity with Reveal(x) Spring '19
Learn how the latest release of ExtraHop Reveal(x), network traffic analysis for the enterprise, accelerates security investigations, incorporates MITRE & OWASP links, and more!
Chase Snyder
3.22.19
Case Study: Proactive Security Hygiene in a Hybrid Enterprise
Watch the recorded ISC2 Security Briefing to learn how a small, agile security team built a proactive security operations practice using network traffic analysis. (CISSP certificate holders, watch to earn one CPE credit!)
Chase Snyder
3.22.19
Improve Threat Hunting & IR with NTA: ISC2 Briefing
Watch the recorded ISC2 Security Briefing to learn how a small, agile security team built a proactive security operations practice using network traffic analysis. (CISSP certificate holders, watch to earn one CPE credit!)
Chase Snyder
3.22.19
ISC2 Security Briefing: Getting More Value from SecOps Frameworks
Watch this recorded ISC2 Security Briefing to learn how SecOps frameworks enable the proactive SOC. (CISSPs, earn a CPE credit while you're at it!)
Chase Snyder
2.13.19
Network Detection & Response (NDR) vs. SIEM
Network detection & response (NDR) vs. SIEM: What are the key differences, and how can these two security solutions work together for a proactive, cost-effective, and scalable SOC?
Chase Snyder
2.7.19
Network Detection & Response (NDR) vs. Intrusion Prevention Systems (IPS)
Compare network detection & response (NDR) products to traditional security solutions with this bakeoff between NDR and intrusion prevention systems (IPS).
Chase Snyder
1.24.19
Feature Short: Cyber Hygiene & Encryption Audit
Watch this 3-minute video to learn how ExtraHop Reveal(x) uses network detection and response to help you quickly and easily audit your network for expired certifications, weak ciphers, and more.
Chase Snyder
1.23.19
Network Detection & Response (NDR) vs. Intrusion Detection Systems (IDS)
Learn how network detection & response (NDR) products compare to intrusion detection systems.
Chase Snyder
1.16.19
Reveal(x) Winter 2019 Sounds the Klaxon
Learn why the latest release of ExtraHop Reveal(x), network traffic analysis for the enterprise, has once again raised the bar for inclusion in the increasingly critical category of security solutions based on network detection and response.
Chase Snyder
11.7.18
Reveal(x) Feature Short: Signal Metrics
Watch this 3-minute video to see how the unique Signal Metrics feature in Reveal(x) highlights behaviors that could be impacting your security posture and reducing your hygiene and compliance so you can quickly act on these potential vulnerabilities.
Chase Snyder
10.31.18
Reveal(x) Feature Short: Threat Intelligence
Watch this 3-minute video to see how you can use ExtraHop Reveal(x), network traffic analysis for the enterprise, to quickly investigate suspicious communications identified by third party threat intelligence feeds using STIX files.
Chase Snyder
10.25.18
Five Reasons You Need to Decrypt Traffic for SecOps Analysis
Decryption is crucial for SecOps analysis, especially for the growing enterprise security category of NTA/NDR. Watch the video.
Chase Snyder
10.15.18
Reveal(x) Feature Short: Investigation
Watch this 3-minute video to see the full Reveal(x) investigation workflow and learn how SecOps can use network traffic analysis to go from high level threat intelligence to the actual contents of suspicious packets in a matter of minutes.
Chase Snyder
10.5.18
Network Traffic Analysis for Enterprise Security
Watch this 6 minute video to learn exactly what sets enterprise-class network traffic analysis products apart from the basic definition of the category and which capabilities are required to be truly best-of-breed.
Chase Snyder
10.1.18
Signal From Noise: ExtraHop Reveal(x) Signal Metrics
Imagine you're a security analyst just beginning an investigation. How do you know which data will be most relevant? Here's how ExtraHop Reveal(x) signal metrics help you quickly understand all the information you need to respond to a potential threat.
Chase Snyder
9.18.18
DDoS Protection Primer: Types and Mitigation Explained
Get to know the latest about DDoS attacks by learning about attack types, mitigation strategies, and how to protect your website.
Chase Snyder
8.14.18
The SANS 2018 SOC Survey Results Are In!
Get the top three takeaways from the 2018 SANS Security Operations Center Survey, and learn how to improve your SOC efficiency based on advice from the experts!
Chase Snyder
8.2.18
Answer InfoSec Questions on Twitter - Win Night Vision Goggles at Black Hat!
With Black Hat right around the corner, we're running an InfoSec quiz game via our Twitter. Learn more about how you can win cool prizes; no need to be attending Black Hat to participate!
Chase Snyder
6.25.18
What Is Network Traffic Analysis (NTA)?
Learn Gartner's definition of network traffic analysis (NTA) and how this process relates to network detection and response (NDR) in enterprise cybersecurity.
Chase Snyder
6.19.18
What's Under The Hood of Reveal(x) Summer 2018
Learn about the new features and capabilities of Reveal(x) Summer 2018, the network traffic analyzer that helps SecOps teams act with confidence and resolve threats faster than any other security analytics solution.
Chase Snyder
6.12.18
INFOGRAPHIC - SecOps Face Off
How can your SOC resolve security issues up to 77% faster than anyone else? Check out the visual comparison of automated investigation vs. a multi-tool workflow to find out!
Chase Snyder
6.6.18
Unpacking the Looming Challenge of Encryption Inside the Enterprise: Part 2
In part two of this info-packed blog series on how increased encryption is reshaping enterprise security, learn how SecOps can decrypt and analyze encrypted information safely and effectively.
Chase Snyder
5.23.18
Unpacking The Looming Challenge of Encryption Inside The Enterprise: Part 1
Learn about the serious consequences increasingly encrypted network data has for SecOps teams that rely on analytics—and why most network security vendors aren't helping—in this first blog in a two-part series.
Chase Snyder
4.27.18
The Top 3 Takeaways from RSA 2018
From the truth about machine learning to how scary encryption can be, here are the top 3 takeaways from RSA 2018!
Chase Snyder
12.18.17
What Is Dwell Time in Cyber Security?
Learn how dwell time in security can hurt your programs and find out how to be proactive to reduce dwell time.
Chase Snyder
11.16.16
The NSA Doesn't Need Zero-Days to Crack Your Network
Most networks are incredibly easy to breach. The NSA doesn't need zero-day exploits, they've said so themselves. So what do they need? Turns out, not much...
Chase Snyder
8.9.16
Automating Ransomware Prevention with ExtraHop and Citrix Octoblu
We just added a slick new capability to our anti-ransomware utility belt, courtesy of Wire Data Wizard John Smith.
Chase Snyder
8.4.16
Customer Testimonial Video Series: "Total Visibility with a Single Monitoring Platform"
How one CIO gets a reliable snapshot of his entire IT environment and a sense of comfort from knowing everything that's happening in real time.
Chase Snyder
8.3.16
Webinar: Ransomware and How to Stop It
View our webinar on ransomware prevention, detection, and recovery.
Chase Snyder
7.27.16
The End of Briforum and the Future of Monitoring on Brian Madden's Penultimate Podcast
Listen in on a great conversation between virtualization legends Brian Madden and John Smith.
Chase Snyder
7.20.16
VIDEO: ExtraHop Enables Seamless IT Operations at Phoenix Children's Hospital
How one children's hospital CIO gets a reliable snapshot of his entire IT environment from a single monitoring platform.
Chase Snyder
7.5.16
Survey: The 7 Biggest Hurdles for IT Teams Implementing Big Data (And How to Get Past Them)
Survey results from 113 IT directors and professionals on how they use Big Data, and whether the value lives up to the hype.
Chase Snyder
6.23.16
VIDEO: Keeping Paychecks On-Time at The Department of Veterans Affairs
How ExtraHop helped Veterans Affairs keep paying people on time after a software failure had them manually entering paycards every Friday.
Chase Snyder
6.21.16
Video: ExtraHop Co-Founder Talks iPhone Hacking & IT Visibility at Infosecurity Europe
BrightTalk sought out ExtraHop co-founder Raja Mukerji for an interview at Infosecurity Europe 2016 last week, and they covered a lot of ground.
Chase Snyder
6.8.16
Mobile Carrier Replaces 20 Troubleshooting Tools with a Single Monitoring Platform
One mobile service provider's fleet management division replaced a mishmash of 20 troubleshooting tools with a single platform: ExtraHop.
Chase Snyder
4.26.16
How to Dodge the Microservices Tax
How microservices and containerized applications put a tax on application performance monitoring, and how to avoid paying it.
Chase Snyder
3.15.16
Three Reasons to Meet ExtraHop At An Upcoming VMUG
Expert in vCloud? Pushing vRealize Log Insight & vRealize Orchestrator to the limit? Got a visibility gap? We want to meet you at a VMUG
Chase Snyder
2.16.16
The NSA's Worst Nightmare
An NSA honcho spoke out about how to stop the NSA from breaching your network. Here's what he said.
Chase Snyder
2.8.16
How Much Data Does The Super Bowl Create?
Join us for a wildly speculative jaunt into the Big Data behind the Big Game.
Chase Snyder
1.6.16
Live Wire, The Next Dimension for Streaming Analytics [WEBINAR]
Listen in on a great conversation between IT thought leaders Eric Kavanagh, Mark Madsen, and Erik Giesa as they discuss the power of stream analytics.
Chase Snyder
1.4.16
Q&A: The Key to Healthcare Big Data Analytics
Learn how wire data has become the linchpin of successful big data analytics at Phoenix Children's Hospital.
Chase Snyder
10.1.15
Happy ICD-10 Day! Here's Some Required Reading for a Smooth Switch
Required reading now that the new ICD-10 medical coding standard is required across the U.S.
Chase Snyder
9.4.15
What Is Wire Data? (Video)
Take a minute and a half to learn what wire data is, and why it is the linchpin of successful IT operations analytics (ITOA).
Chase Snyder
8.27.15
What is FHIR (Fast Healthcare Interoperability Resources)?
Learn what FHIR is, how it relates to the HL7 protocol, and standards you should know about this way of exchanging healthcare information electronically.
Chase Snyder
6.5.15
ITOA Spotlight: Turning IT Into a Profit Center
SearchNetworking published an article covering how ExtraHop turns IT teams into profit centers for their companies.
Chase Snyder
5.4.15
Real-User Monitoring's Next Frontier: Context, Context, Context!
Data derived from traditional RUM solutions lacks context. ExtraHop merges RUM metrics from Boomerang.js with wire data insights for more relevant results.
Chase Snyder