Security

Security analytics, trends, experiments, and more.

Blog Categories:

ExtraHop Sales Engineering VP Matt Cauthorn explains how you can use perfect forward secrecy encryption while maintaining visibility.

An entirely new approach to investigating anomalies in your environment.

Ransomware tops the list of security concerns for healthcare delivery organizations. Here's how one university hospital system in the U.S. tapped into ExtraHop to target this malware.

Attackers have proven repeatedly that they can poke holes in any perimeter and compromise any endpoint. But with total visibility into network traffic, you have the power to find any intrusion and deal with it.

What is Perfect Forward Secrecy encryption and how ExtraHop allows you to decrypt Perfect Forward Secrecy in real time.

The ExtraHop 7.0 release advances the state-of-the-art in terms of gaining visibility into your environment. Finally, you can know the shape of your enterprise.

While most organizations are left reeling after attacks, leading security teams are getting proactive about defense.

Listen to Byron Acohido and ExtraHop co-founder and CTO discuss ExtraHop's role in cybersecurity and the growing need for inward-focused network traffic analysis.

We took a moment to chat with Mike Sheward, author of the Digital Forensic Diaries, about his collection of cybersecurity short stories.

ExtraHop's latest solution bundle allows you to quickly identify potential threats and initiate targeted investigations.

At the season finale of AFCEA Washington DC Chapter's Monthly Breakfast Program, the message was clear: the most advanced threats are operating under the surface.

We sat down with our new Senior Vice President of Sales to learn more about his background in technology sales, his leadership style, and what made ExtraHop so attractive to this industry veteran.

Build Something Great

Join the company that was named one of Seattle's Best Companies to Work For.