Security

Blog Categories:

ExtraHop Sales Engineering VP Matt Cauthorn explains how you can use perfect forward secrecy encryption while maintaining visibility.

Ransomware tops the list of security concerns for healthcare delivery organizations. Here's how one U.S. university hospital system tapped into ExtraHop to target this malware.

An entirely new approach to investigating anomalies in your environment.

Attackers have proven repeatedly that they can poke holes in any perimeter and compromise any endpoint. But with total visibility into network traffic, you have the power to find any intrusion and deal with it.

What is Perfect Forward Secrecy encryption and how ExtraHop allows you to decrypt Perfect Forward Secrecy in real time.

The ExtraHop 7.0 release advances the state-of-the-art in terms of gaining visibility into your environment. Finally, you can know the shape of your enterprise.

While most organizations are left reeling after attacks, leading security teams are getting proactive about defense.

Listen to Byron Acohido and ExtraHop co-founder and CTO discuss ExtraHop's role in cybersecurity and the growing need for inward-focused network traffic analysis.

Learn why Perfect Forward Secrecy is more important than ever, and how IT Ops and SecOps must work together to improve cyber security without losing visibility.

We took a moment to chat with Mike Sheward, author of the Digital Forensic Diaries, about his collection of cybersecurity short stories.

ExtraHop's latest solution bundle allows you to quickly identify potential threats and initiate targeted investigations.

At the season finale of AFCEA Washington DC Chapter's Monthly Breakfast Program, the message was clear: the most advanced threats are operating under the surface.

Build Something Great

Join the company that was named one of Seattle's Best Companies to Work For.