NEW

The True Cost of a Security Breach

Arrow pointing right
ExtraHop Logo
  • Productschevron right
  • Solutionschevron right
  • Why ExtraHopchevron right
  • Blogchevron right
  • Resourceschevron right

Arrow pointing leftBlog

Tyson Supasatit

Former Employee - Sr. Product Marketing Manager

About Tyson

Tyson helps to educate the IT Operations Management community about what is possible with real-time analysis of wire data. Prior to ExtraHop, Tyson worked as a technical marketing writer for Microsoft, Seagate, and the Association of Computing Machinery, where he wrote for and edited the TechNews e-mail newsletter from 2000 to 2005. You can find him on Twitter under @tsupasat.

Posts by this author

Collaboration in Crisis: How to Bring IT and Cybersecurity Teams Together

May 21, 2020

Dark Reading recently took a measure of the relationship between IT and Security teams. See at the results of the survey and learn best practices from our expert panel.

Remote Access Considerations: How to Ensure Availability and Security for Remote Workers

March 20, 2020

The COVID-19 pandemic is driving people to work from home and straining remote access infrastructure. Here's how IT and Security teams can cope.

How to Easily Spot LDAP Clear Text Binds Before the Windows Update

February 6, 2020

Sending LDAP passwords in clear text was never a good idea, but a Windows update due in the second half of 2020 will make it also painful. Learn how to spot applications that will be affected.

Response Automation with Reveal(x)

September 18, 2019

Network detection and response (NDR) spots threats that other security solutions miss. Now learn how they automate the appropriate response.

Can You Encrypt Telnet?

August 14, 2019

Telnet sessions between client and server are not encrypted, leaving vulnerabilities. ExtraHop shares how to to encrypt telnet as well as secure alternatives.

What Traffic Mirroring Means for Cloud Security

June 27, 2019

Learn why traffic mirroring in the public cloud (like Amazon VPC Traffic Mirroring) is the best news in years for security teams using AWS or Azure.

How Traffic Mirroring in the Cloud Works

June 25, 2019

Learn how the availability of traffic mirroring in the public cloud fills critical network visibility gaps for enterprise security teams using AWS or Azure.

Five Reasons to Integrate SecOps & NetOps

June 3, 2019

Learn why you should break down the barriers between Security Operations (SecOps) and Network Operations (NetOps) and align their tools, processes, and skills.

How Network Detection & Response Supports the CIS Top 20 Controls

March 14, 2019

Learn how network detection & response (NDR) solutions are the easiest way to get the most CIS Top 20 Control coverage in a short amount of time.

Show and Tell: What a Live Attack Simulation Looks Like in Reveal(x)

February 12, 2019

Our online demo now features a live attack simulation where you can observe a hacker doing her job: exploiting a Drupal vulnerability, installing custom executables through PsExec, and more.

Decrypt Perfect Forward Secrecy with F5 BIG-IP and ExtraHop

November 15, 2018

Learn how to use F5 BIG-IP to capture perfect forward secrecy session keys and forward them to ExtraHop in order to passively analyze PFS-encrypted network traffic.

TLS 1.3: Will Your Network Monitoring Go Blind?

May 11, 2018

Learn how to maintain IT and security visibility with the required TLS 1.3 perfect forward secrecy encryption. Watch this webinar to learn more.

How ExtraHop Analyzes 1 PB+ Per Day Without Breaking a Sweat

April 15, 2018

If you can't scale your analytics platform to match cloud adoption and unprecedented data growth, you'll be making IT and security decisions based on guesswork. Learn how ExtraHop analyzes over 1 PB of data per day, and why that scalability matters.

The Network Engineer's Guide to the Galaxy...of Application Teams

November 2, 2017

Network engineer Rasika Nayanajith shares his experience using ExtraHop to gain credibility with application teams.

Lightboard Video: The Silent Scream in Your Datacenter

April 27, 2017

Monitoring your data combined with security measures, improve your tactical data timeline.

Data Gravity: What It Is and Why You Should Care

March 14, 2017

How to solve the problem of data gravity using machine learning for cloud analytics.

Don't Trust Log Data! Lessons from the Cryptonomicon

October 27, 2016

It's been clear for decades that logs are flawed when it comes to security. Even the cyberpunks in Cryptonomicon knew it. What should you use instead?

How Lockheed Martin Uses Wire Data For Situational Awareness

August 13, 2015

Eric Sharpsten, CTO of Lockheed Martin's Federal Health practice, discusses how his organization gains visibility in large, dynamic IT environments.

Server Decommissioning: Wait, We Have How Many DNS Servers?!

May 29, 2014

ExtraHop auto-discovers and classifies every device transacting on a network. Auto-discovery makes it easy to identify and decommission legacy DNS, web, and other servers.

Paying Down Technical Debt in Your IT Infrastructure

February 15, 2014

It is difficult to allocate resources to eliminating waste in the IT environment, but ExtraHop can make continuous improvement efforts easier.

Transaction Tracing for Web Gateways, Load Balancers, and Other Proxies

September 18, 2013

A web security company used ExtraHop to pinpoint the cause of latency for its web gateway/proxy SaaS offering using recognize-and-trace transaction tracing.

Experience RevealX NDR for Yourself

Schedule a demo