Posts
5.21.20
Collaboration in Crisis: How to Bring IT and Cybersecurity Teams Together
5.18.20
With Cybersecurity Budgets Under Scrutiny, It's Time to Get Into Shape
3.20.20
Remote Access Considerations: How to Ensure Availability and Security for Remote Workers
2.6.20
How to Easily Spot LDAP Clear Text Binds Before the Windows Update
12.2.19
SANS WhatWorks: ExtraHop Reveal(x) for Security & IT Ops Integration
8.14.19
Can You Encrypt Telnet?
7.30.19
ExtraHop Security Advisory: Phoning Home Data
6.27.19
What Traffic Mirroring Means for Cloud Security
6.25.19
How Traffic Mirroring in the Cloud Works
6.3.19
Five Reasons to Integrate SecOps & NetOps
5.21.19
IT Detects Security Threats First. It's Worth Considering Why.
3.14.19
How Network Detection & Response Supports the CIS Top 20 Controls
2.12.19
Show and Tell: What a Live Attack Simulation Looks Like in Reveal(x)
1.4.19
Incident Response Under GDPR
12.11.18
Clarity in the Fog of War: The Value of Red-Blue Exercises
11.30.18
Top 2018 Risk Management Stats for Security Leaders
11.15.18
Decrypt Perfect Forward Secrecy with F5 BIG-IP and ExtraHop
5.11.18
TLS 1.3: Will Your Network Monitoring Go Blind?
4.15.18
How ExtraHop Analyzes 1 PB+ Per Day Without Breaking a Sweat
2.20.18
INFOGRAPHIC: Keep Your Application Vendors Honest About Performance
2.20.18
How to Keep Your Software Vendors Accountable for Performance
2.8.18
How to Save Your Data Center Migration
11.27.17
Network Teams, Need A Wingman?
11.2.17
It's Not Citrix...AD, Storage, etc., Are to Blame
11.2.17
The Network Engineer's Guide to the Galaxy...of Application Teams
9.19.17
Introducing ExtraHop 7.0
9.5.17
Hunter or Hunted ... Which Would You Rather Be?
7.25.17
Digital Forensic Diaries: Q&A with Author Mike Sheward
7.7.17
Splunk Agrees: Wire Data Adds Crucial Context to Logs
4.27.17
Lightboard Video: The Silent Scream in Your Datacenter
3.14.17
Data Gravity: What It Is and Why You Should Care
3.14.17
Do IT Pros Think Machine Learning Is Hope or Hype?
1.3.17
Microsoft Will Block SHA-1 Certs in 2017. Here's How to Find Them.
11.30.16
Network Engineers Love Watching Paint Dry
11.3.16
Log Data vs. Wire Data: Why There's a Clear Winner
10.27.16
Don't Trust Log Data! Lessons from the Cryptonomicon
8.30.16
Manage and Monitor Containerized Applications with VMware and ExtraHop
8.26.15
The Results Are In: "State of ITOA" Survey
8.13.15
How Lockheed Martin Uses Wire Data For Situational Awareness
1.12.15
ExtraHop Is the Proud Home of the Binary 12th Man!
11.5.14
The Big Data Opportunity for Healthcare with HL7 Analytics
10.15.14
Neuter the POODLE: Detect All SSLv3 Clients and Servers with ExtraHop
9.12.14
IT Is Drowning in Data, But Thirsty for Insight
9.3.14
Why IT Needs a Culture of Healthy Paranoia
6.18.14
See Which World Cup Matches Are Popular in Your Office
5.29.14
Server Decommissioning: Wait, We Have How Many DNS Servers?!
5.13.14
Run Your "Microsoft Shop" Better with Wire Data Visibility
5.1.14
Target's Data Breach: What IT Pros on LinkedIn Had to Say
4.11.14
Detect Heartbleed Exploits with ExtraHop's Free Download
4.4.14
More Time with Patients, Less Time Waiting for the Application
2.17.14
You Should Never Send to Know "For Whom the SYN ACKs"
2.15.14
Paying Down Technical Debt in Your IT Infrastructure
2.1.14
Monitoring at Scale: Questions You Should Ask Your Vendor
1.30.14
Seahawks Get a Geeky Salute with ExtraHop's "Binary 12th Man"
1.3.14
What IT Can Learn from Target's Data Breach
10.23.13
Four Data Sources for IT Operations Analytics (ITOA) – A Conceptual Framework
9.18.13
Transaction Tracing for Web Gateways, Load Balancers, and Other Proxies
6.5.13
Wire Data: The Visibility You Need for Microsoft Environments
11.15.12
Reimagining Packet Capture in Light of Riverbed's Opnet Acquisition
10.24.12