Company

A look at why we do what we do.

Blog Categories:

While most organizations are left reeling after attacks, leading security teams are getting proactive about defense.

Listen to Byron Acohido and ExtraHop co-founder and CTO discuss ExtraHop's role in cybersecurity and the growing need for inward-focused network traffic analysis.

Partnership to put patient outcomes at the forefront of health IT.

For those of us in the computer security industry, the end of July in Las Vegas means the annual week of conferences; BlackHat and DefCon. It's always a great—albeit exhausting—week.

Migrating portions of your network is inevitable, but that's no reason to rush into it. Here are four key considerations before you make the move.

We took a moment to chat with Mike Sheward, author of the Digital Forensic Diaries, about his collection of cybersecurity short stories.

ExtraHop's latest solution bundle allows you to quickly identify potential threats and initiate targeted investigations.

What is SMBv1 and why should you shut it down before it can be used against you?

At the season finale of AFCEA Washington DC Chapter's Monthly Breakfast Program, the message was clear: the most advanced threats are operating under the surface.

Learn how to secure your systems against new ransomware like Petya and SOREBRECT.

Supercharge Your Cisco Tetration Security Policy Enforcement with ExtraHop's Real-Time Analytics

Heard of the 5 stages of grief? Learn how security pros cope with breaches.

Build Something Great

Join the company that was named one of Seattle's Best Companies to Work For.