ExtraHop November TL;DR

A quick refresh of what you may have missed in cybersecurity for November

Welcome to this edition of the ExtraHop TL;DR! This is your place to get the highlights on what we’re talking about this month. You can also watch our video broadcasts on the third Friday of every month on our LinkedIn page.

Introducing Breakthrough Decryption for Microsoft Environments

Get high-fidelity decryption capabilities to detect a new class of advanced attacks—including ‘living-off-the-land’ and Active Directory Kerberos Golden Ticket attacks—that exploit proprietary Microsoft protocols to evade security controls and traditional monitoring tools like next-generation firewalls (NGFW) and web proxies.

Learn about strategic decryption

 

Forensics Readiness Speeds Root Cause Analysis

Get a practical understanding of incident response, network forensics, and learn how to eradicate intruders and quickly recover your operations.

Speed Response Times with Network Forensics

Defending Your Containerized Environments

Securing containers requires continuous monitoring, AI-powered analysis, and the ability to detect and respond to advanced threats as they occur. With ExtraHop Reveal(x) 360, you can unify security across containers and services in a single management pane.

Learn About Container Security

Threat of the Month: Supply Chain Compromise

The supply chain doesn’t only affect our shipping and delivery times. It also affects our network security. Learn how advanced attackers use the network’s supply chain to infiltrate and create trouble for organizations.

Meet Ms. Supply Chain Compromise

Visit the Attack Library

From the ExtraHop Blog

Take a look at some of our recent stories.

Our IT Ops Director Gets Colorful in the Name of Tech Diversity

Bri Hatch, Sr. Director of IT Operations, recently raised over $31,000 for organizations committed to diversity in tech. All it took was a fantastic makeover.

Learn How You Can Support Diversity in Tech

Find Exploit Attempts Against the CISA Known Exploited Vulnerabilities

The Cybersecurity and Infrastructure Security Agency (CISA) recently issued a new directive for federal agencies, which may also serve as best practices for private organizations.

Find Out How Reveal(x) Supports Compliance

Bridging Data Retention Gaps En Route to Zero Trust

Change is rapidly underway for many government agencies and public sector organizations as they work to implement fresh zero trust mandates.

Learn About NDR for Data Retention

This post is also available in: Danish