Welcome to the June edition of the ExtraHop TL;DR! This is your place to get the highlights on what we're talking about this month. You can also watch our video broadcasts on the third Friday of every month on our LinkedIn page.
How XDR Gets Real with ExtraHop and CrowdStrike
Advanced attackers work hard to evade defenses and stay stealthy. By seamlessly correlating network intelligence and endpoint visibility, security teams can reduce attacker dwell time and respond instantly to stop an intrusion from becoming a breach. Join CrowdStrike and ExtraHop to learn how to make extended detection and response (XDR) a reality, so your security team can stop ransomware and other advanced threats faster.
Watch the Webinar: How ExtraHop and Crowdstrike Integrations Work
ExtraHop Reveal(x) 360 for AWS
Reveal(x) 360 now offers continuous visibility in AWS based on VPC Flow Logs. Organizations can choose flow logs as a standalone subscription or combine that cloud-native data source with packets to take a multi-layered approach to cloud threat defense.
Download Now: Secure Your Critical Assets in AWS
Understanding Shields Up
Implementing CISA's recommended controls may be difficult for security teams already struggling with staffing shortages and challenges related to remote work, cloud adoption, and legacy systems. ExtraHop Reveal(x) network detection and response delivers several vital technical controls to achieve the recommended high-level goals.
Customer Success: Brewin Dolphin
Brewin Dolphin PLC is one of the United Kingdom's leading financial management companies. Find out how ExtraHop gave them deeper visibility and control over their network traffic.
Threat of the Month: Denial of Service (DoS) Attack
A denial-of-service (DoS) attack is a tactic for overloading a machine or network to make it unavailable. Attackers achieve this by sending more traffic than the target can handle, causing it to fail—making it unable to provide service to its normal users. Examples of targets might include email, online banking, websites, or any other service relying on a targeted network or computer.
Learn More about Denial of Service Attacks
Visit the Cyberattack Glossary
From the ExtraHop Blog
Take a look at some of our recent stories.
Top 5 Blind Spots in Supply Chain Attacks
Supply chain attacks are on the rise. Learn how to spot and defend against the most common entry points and reduce your organization's supply chain risk.
Learn How to Protect Your Network
2022 Edison Awards Honors Advancements in Strategic Decryption
ExtraHop is honored to have received the Silver Award for Cybersecurity for Innovative Services. Learn more about the Edison Awards and why decryption is necessary for security.
Learn More about the Edison Awards
Meet the ExtraHop Team Members Honored as 2022 CRN Women of the Channel
ExtraHop is thrilled to honor the winners of the 2022 CRN Women of the Channel. Hear from these female trailblazers on what this achievement means to them.
Meet the CRN Women of the Channel
In Other News
Read, watch, or listen to some interesting news from around the internet.
The Register: CIOs Largely Believe Their Software Supply Chain is Vulnerable
Supply chain attacks have been making global waves. In a recent report, many CIOs understand this risk but have yet to implement a stronger security posture to protect their enterprise.
Dark Reading: ChromeLoader Malware Hijacks Browsers with ISO Files
This malware's abuse of PowerShell makes it more dangerous, allowing for more advanced attacks including ransomware, fileless malware, and malicious code memory injections.