About
This bio was provided during this employee's time at ExtraHop and does not reflect any current positions or experience.
About Cal
Cal is a Senior Technical Trainer at ExtraHop.
Posts
5.22.22
Bodycams and Firewalls: The Internet is Watching, Are You?
A city discovered that sensitive data was exposed to the internet. Learn how they used ExtraHop Reveal(x) to investigate the problem and avoid becoming a target.
Cal Jewell
2.3.22
The Bad Guys Only Have to Be Wrong Once
A real-world attack proves why the defenders have the post-compromise advantage with network detection and response.
Cal Jewell
11.9.21
DoublePulsar Detected
Learn how one organization steps into action when DoublePulsar—a backdoor implant that was used in the infamous WannaCry attack—is detected.
Cal Jewell
9.30.21
Weak Cryptography Search Leads to Unexpected Discoveries with Reveal(x)
When an enterprise discovers the easy way to search for weak cryptography, they find something a little more sinister.
Cal Jewell
9.10.21
When Vendor Practices Put Security at Risk
How the security practices of third-party vendors leave the door open for hackers to steal enterprise data.
Cal Jewell
8.10.21
On the Lookout for Credential-Sharing Gaps
Sharing credentials over outdated protocols puts your organization at risk of cyberattack. Learn what to do about it.
Cal Jewell
7.13.21
Cryptography Training Reveals a Security Surprise
A journey into cryptography revealed security exposure from an unlikely on-campus vendor.
Cal Jewell
6.18.21
How DNS Traffic Can Be a Canary in the Coal Mine
How a government agency stopped a DNS amplification attack attempt dead in its tracks.
Cal Jewell
2.4.21
When You Detect Network Enumeration: A Real-World Example in Two Acts
A network enumeration detection kicks off an investogation of some very strange behavior happening on the network. Learn more about this real-world example.
Cal Jewell
2.4.21
Act Two: The Vendor Responds
The second installment of our story about investigating some very strange behavior happening on the network.
Cal Jewell
2.20.20
Threat Detection & Investigation in Active Directory
See how easy it is to track down potentially compromised assets with ExtraHop Reveal(x) in this real-world example discovered during an ExtraHop training session.
Cal Jewell