ExtraHop
![Infosecurity Europe 2022 video](https://img.helpnetsecurity.com/wp-content/uploads/2022/06/21141633/infosec_eu_2022_video-400x200.jpg)
Infosecurity Europe 2022 video walkthrough
Infosecurity Europe 2022 opened its doors today at the ExCeL in London, here’s a look inside the event. The featured vendors are: Akamai Technologies, AlgoSec, Appgate, …
![](https://img.helpnetsecurity.com/wp-content/uploads/2022/03/28134423/product_month_march2022_1200-400x200.jpg)
Infosec products of the month: March 2022
Here’s a look at the most interesting products from the past month, featuring releases from: Actiphy, Anomali, AvePoint, Ciphertex Data Security, Contrast Security, Critical …
![Spring](https://img.helpnetsecurity.com/wp-content/uploads/2022/03/31123604/spring1-1600-2-400x200.jpg)
Spring4Shell: No need to panic, but mitigations are advised
Security teams around the world got another shock on Thursday when news of disclosure of a PoC for an unauthenticated RCE zero-day vulnerability in Spring Core, a massively …
![](https://img.helpnetsecurity.com/wp-content/uploads/2022/03/24110431/infosec_week_25032022-400x200.jpg)
New infosec products of the week: March 25, 2022
Here’s a look at the most interesting products from the past week, featuring releases from AvePoint, DTEX Systems, ExtraHop, NICE Actimize, and Sonrai Security. NICE Actimize …
![security platform](https://img.helpnetsecurity.com/wp-content/uploads/2021/10/20092552/security_platforma_1200-400x200.jpg)
ExtraHop Reveal(x) 360 for AWS detects malicious activity across workloads
ExtraHop announced that it has extended the power of Reveal(x) 360 to provide frictionless threat visibility for Amazon Web Services (AWS). ExtraHop Reveal(x) 360 now applies …
![ransomware](https://img.helpnetsecurity.com/wp-content/uploads/2021/08/27135730/ransomware_2_27082021-400x200.jpg)
77% of IT leaders are confident in their ability to prevent or mitigate a ransomware attack
ExtraHop’s report shows that however capable IT organizations have been in managing the dramatic transformations of the past couple of years, confidence still tends to …
![encryption](https://img.helpnetsecurity.com/wp-content/uploads/2020/01/29153125/encryption-1-400x200.jpg)
IT leaders confident in their ability to manage a ransomware attack: They should know better
ExtraHop released findings from a survey on ransomware that sheds light on the discrepancies between how IT decision makers (ITDMs) see their current security practices, and …
![security platform](https://img.helpnetsecurity.com/wp-content/uploads/2021/10/20092552/security_platforma_1200-400x200.jpg)
ExtraHop expands decryption support for Microsoft authentication and application protocols
ExtraHop announced that it has expanded decryption support for Microsoft authentication and application protocols, providing high-fidelity detection of malicious activity …
ExtraHop expands Reveal(x) Advisor services to accelerate incident response for organizations
ExtraHop announced expanded Reveal(x) Advisor services that provide threat detection and hunting capabilities alongside network assurance analysis. Reveal(x) Advisor provides …
CrowdStrike Security Cloud integrates with NDR and NTA solutions to defend against any threats
CrowdStrike announced a series of integrations with CrowdStrike Security Cloud that correlates the CrowdStrike Falcon platform’s enriched endpoint and workload telemetry with …
![laptop](https://img.helpnetsecurity.com/wp-content/uploads/2020/04/21140811/laptop-biohazard-400x200.jpg)
Your greatest work from home lifeline is also your newest attack vector
Enterprises have been experimenting with work from home policies for years. Unfortunately, that experiment suddenly became the default this spring as local and state …
ExtraHop Reveal(x) 360: Improving security posture without compromising availability
ExtraHop, the leader in cloud-native network detection and response, announced the general availability of Reveal(x) 360, the first SaaS-based network detection and response …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD