About
This bio was provided during this employee's time at ExtraHop and does not reflect any current positions or experience.
About Carol
Carol is a cybersecurity writer and content nerd at ExtraHop.
Posts
3.1.22
Reducing Cloud Security Friction in the C-Suite E-Book
Learn the most common threats to cloud security and get a primer on available cloud security solutions.
Carol Caley
8.13.21
MeriTalk: Ransomware Tops U.S. Security Agenda
A recent MeriTalk white paper explores how the Colonial Pipeline hack has pushed ransomware to the top of the U.S. security agenda.
Carol Caley
7.26.21
SANS on Defining and Measuring Cybersecurity Visibility
Visibility is necessary for security but the concept isn't exactly clear-cut. Hear from SANS on defining visibility to help you confidently identify blind spots, strengthen security, and measure success on this cybersecurity KPI.
Carol Caley
7.9.21
Three Common Advanced Threats and How to Stop Them
Advanced persistent threats, supply chain attacks, and zero days are becoming more prevalent. A new white paper explores each threat, how they overlap, and how to detect them before they cause damage.
Carol Caley
5.17.21
Podcast: NDR, EDR & Implementing Zero Trust
John Kindervag, credited as the creator of zero trust, sat down to talk about zero trust implementation and how security solutions can support it.
Carol Caley
5.17.21
Podcast: NDR, EDR, and Implementing Zero Trust
John Kindervag, credited as the creator of zero trust, sat down to talk about zero trust implementation and how security solutions can support it.
Carol Caley
5.12.21
Insecure Protocols: SMBv1, LLMNR, NTLM, and HTTP
Learn what to do to protect your organization from the vulnerable protocols that enabled attacks such as WannaCry ransomware: SMBv1, LLMNR, NTLM, and HTTP.
Carol Caley
5.6.21
From the FBI to the Private Sector: What Mark Bowling Has Learned About Cybersecurity
Mark Bowling brings thirty years of cybersecurity and intelligence expertise to ExtraHop, including time working at the FBI and the Department of Education. Read on for his answers to our top five questions.
Carol Caley
4.26.21
New Report: How SUNBURST Used DNS to Avoid Detection
A new report details how hiding in DNS traffic was a critical tactic used by SUNBURST attackers to avoid detection—and why DNS is so challenging to secure.
Carol Caley
3.23.21
Gartner Includes NDR as One of the Controls Against SUNBURST
In a recent blog post, Gartner lists network detection and response (NDR) as one of the controls necessary to thwart supply chain attacks. Learn more.
Carol Caley
3.18.21
There's a Better Way to Monitor DNS
Well-known cyberattacks take advantage of DNS to evade common security tools. Learn how these attacks work, and how to monitor DNS traffic for threats.
Carol Caley
3.11.21
Scanning for DNS
Most people don't think of brick-and-mortar retail stores as technology centers, but as one Big Box retailer discovered, even grocery scanners can pose a cybersecurity risk. Read this story of detecting suspicious DNS behavior.
Carol Caley
2.12.21
ExtraHop's CRN Channel Chiefs on Building Opportunities for Partners
Read a Q+A with ExtraHop's two CRN Channel Chiefs, Mark Fitzmaurice, Vice President of Worldwide Channel Sales, and Todd Debell, Director of Channels for the Americas.
Carol Caley
2.11.21
New Report on Lessons Learned Observing SUNBURST's Behavior
Get ExtraHop's latest report exploring how SUNBURST's behavior evaded defenses and what we can do going forward.
Carol Caley
1.26.21
SANS Review: Taking on Modern Threats
In this SANS review of ExtraHop Reveal(x) network detection and response, Dave Shackleford discusses it's intuitive design and usability.
Carol Caley
1.1.21
LDAP Encryption: What You Need to Know in 2024
Secure your LDAP traffic in 2024: Learn how encryption shields sensitive data. Explore LDAP encryption FAQs for strong cybersecurity.
Carol Caley
12.8.20
Paving the Way for Secure DevOps in the Cloud
SANS conducted their annual DevOps survey, seeking to understand whether or not security teams are able to keep pace with DevOps. They concluded that shifting security earlier in the process is a smart strategy for faster deployment.
Carol Caley
12.4.20
Folding@home for COVID-19 Research
A team of ExtraHoppers has made it into the top 800 in Folding@home, a competitive distributed computing project aiming to better understand COVID-19.
Carol Caley
11.11.20
Why Network Detection and Response Belongs in Your 2021 Strategy
With 2021 quickly approaching, it's time to think critically about what's working in your security strategy and what could stand to improve. ExtraHop's Mike Campfield joined Enterprise Security Weekly to discuss why network detection and response is critical to the future of security.
Carol Caley
10.23.20
Gartner Report: Threat Hunting for Threat Protection
Threat hunting is a way for advanced security operations teams to proactively seek out and eliminate threats in their environment. This Gartner report explores the potential benefits of threat hunting.
Carol Caley
10.14.20
The Feeling is Mutual: Security Solution Reviews for ExtraHop Reveal(x)
ExtraHop Reveal(x) customers have shared their experiences, ensuring that ExtraHop ranks as a top service provider on Gartner's Peer Insights in the Network Detection and Response market. We can't thank them enough.
Carol Caley
10.7.20
Cloud-Native NDR: Shared Responsibility's Missing Link
(ISC)² has launched a three-part webinar series on how cloud-native network detection and response helps enterprises uphold their end of the shared responsibility model, while offering the same scalability that other cloud services offer.
Carol Caley
8.26.20
SANS on Building Effective SOC Teams Despite the Skills Gap
A recent SANS survey found that, because of budget limitations, more companies are reconsidering their security staff hiring. Given that necessary skills are still in demand, Security Operations Managers will need to take a different approach to bridge the gap.
Carol Caley
5.15.20
Longread: Should You Use Zoom?
Now that business (and your social life) runs on Zoom, what are the security issues that have plagued the video conferencing giant—and how serious are they, really? Read the blog for a breakdown.
Carol Caley
3.10.20
The Packet Pushers Weigh In on ExtraHop IoT Monitoring Capabilities
Get the podcast for the news in IT and listen for a mention of ExtraHop's new IoT capabilities.
Carol Caley
1.3.20
EDR Security: The Landscape in 2020
What is endpoint detection and response (EDR) security? Read more about the EDR landscape for 2020 and beyond.
Carol Caley