ExtraHop November TL;DR
A quick refresh of what you may have missed in cybersecurity for November
Welcome to this edition of the ExtraHop TL;DR! This is your place to get the highlights on what we’re talking about this month. You can also watch our video broadcasts on the third Friday of every month on our LinkedIn page.
Introducing Breakthrough Decryption for Microsoft Environments
Get high-fidelity decryption capabilities to detect a new class of advanced attacks—including ‘living-off-the-land’ and Active Directory Kerberos Golden Ticket attacks—that exploit proprietary Microsoft protocols to evade security controls and traditional monitoring tools like next-generation firewalls (NGFW) and web proxies.
Learn about strategic decryption
Forensics Readiness Speeds Root Cause Analysis
Get a practical understanding of incident response, network forensics, and learn how to eradicate intruders and quickly recover your operations.
Speed Response Times with Network Forensics
Defending Your Containerized Environments
Securing containers requires continuous monitoring, AI-powered analysis, and the ability to detect and respond to advanced threats as they occur. With ExtraHop Reveal(x) 360, you can unify security across containers and services in a single management pane.
Learn About Container Security
Threat of the Month: Supply Chain Compromise
The supply chain doesn’t only affect our shipping and delivery times. It also affects our network security. Learn how advanced attackers use the network’s supply chain to infiltrate and create trouble for organizations.
Meet Ms. Supply Chain Compromise
From the ExtraHop Blog
Take a look at some of our recent stories.
Our IT Ops Director Gets Colorful in the Name of Tech Diversity
Bri Hatch, Sr. Director of IT Operations, recently raised over $31,000 for organizations committed to diversity in tech. All it took was a fantastic makeover.
Learn How You Can Support Diversity in Tech
Find Exploit Attempts Against the CISA Known Exploited Vulnerabilities
The Cybersecurity and Infrastructure Security Agency (CISA) recently issued a new directive for federal agencies, which may also serve as best practices for private organizations.
Find Out How Reveal(x) Supports Compliance
Bridging Data Retention Gaps En Route to Zero Trust
Change is rapidly underway for many government agencies and public sector organizations as they work to implement fresh zero trust mandates.
This post is also available in: Danish