About
This bio was provided during this employee's time at ExtraHop and does not reflect any current positions or experience.
About Chase
As a Sr. Product Marketing Manager at ExtraHop, Chase strives to extract the signal from the noise in the cybersecurity market, to provide security leaders and practitioners with information they can actually use to stay ahead of advanced persistent threats. Chase would never claim to be an expert at anything, but some topics he has above-average knowledge about include network detection and response, security operations, cryptography, and a grab bag of cybersecurity frameworks including NIST CSF, MITRE ATT&CK and D3FEND, and the CIS Top 20 controls.
Posts
8.4.22
Software Supply Chain Attack vs. Supply Chain Vulnerability: What's The Difference?
What's the difference between an attack and a vulnerability? Not all software supply chain security issues are the same. Learn more.
Chase Snyder
7.28.22
Integrate EDR and NDR for Comprehensive MITRE ATT&CK Coverage
This blog outlines how network detection and response (NDR) and endpoint detection and response (EDR) complement each other's capabilities to provide broad, deep coverage of the MITRE ATT&CK Framework.
Chase Snyder
6.2.22
Five Blind Spots That Leave You Open to Supply Chain Vulnerabilities
Learn the top five undersecured software supply chain attack vectors, and how to gain the visibility you need to reduce supply chain risk.
Chase Snyder
1.27.22
Accelerate Cybersecurity Investigations with Reveal(x) Threat Briefings
Use correlated, contextualized data to simplify response times, helping you regain the advantage.
Chase Snyder
11.17.21
When They're Already Inside the Walls: How to Detect and Stop Lateral Movement
Attackers spend a lot of time moving laterally within your environment, trying to reach their targets. Detecting lateral movement can be a challenge, especially if they're using living-off-the-land techniques. Here's what you can do.
Chase Snyder
10.13.21
Secure Microsoft 365 with Reveal(x) 360 Network Detection and Response
Microsoft 365 integration is here, helping you detect and investigate threats to your Microsoft SaaS tools using ExtraHop Reveal(x) 360 network detection and response.
Chase Snyder
8.20.21
What is Mitre D3FEND?
Knowing an attacker's tactics and techniques is just the first step toward effective defense. Learn how the new MITRE D3FEND matrix takes the next step by documenting effective countermeasures.
Chase Snyder
8.3.21
ExtraHop is the Founding NDR Provider in the XDR Alliance
Exabeam has announced the XDR Alliance, a partnership of cybersecurity innovators, with ExtraHop as the alliance's founding member in the NDR category.
Chase Snyder
7.29.21
SIEM Alone Won't Stop Advanced Threats. Integrated NDR & SIEM Can. Here's Why.
Learn about the benefits of integrating NDR and SIEM to defend your organization against advanced threats.
Chase Snyder
6.29.21
ExtraHop Contributes Network Security Expertise to MITRE ATT&CK Framework
ExtraHop was the first NDR vendor to natively integrate MITRE ATT&CK into their interface. They're now the first to contribute to the ATT&CK framework.
Chase Snyder
6.25.21
Top 3 Trends from the 2021 Verizon DBIR
The Verizon 2021 Data Breach Investigations Report (DBIR) provides insights into cybersecurity trends. Read our top takeaways, plus cyberdefense tips.
Chase Snyder
5.26.21
Announcing Reveal(x) 360 NDR in the CrowdStrike App Store
ExtraHop Reveal(x) 360 is the first NDR app in the CrowdStrike app store. Learn how integrated EDR and NDR can catch and stop advanced attacks faster.
Chase Snyder
4.28.21
New eBook: Why the Time Is Right for Network and Security Collaboration
With accelerated cloud adoption, remote work, and increasingly advanced attacks, now is the time for network and security teams to collaborate.
Chase Snyder
3.24.21
The Ground Truth: Securing Remote Work with Collaborative NetSecOps
Distributed workforces aren't going anywhere. Learn about the challenges and opportunities in 2021 and beyond with NetOps and SecOps collaboration.
Chase Snyder
2.19.21
Where Does NDR Stand in the 2020 Gartner Hype Cycle for Security Operations?
The 2020 Gartner Hype Cycle for Security Operations shows NDR drawing near to the Slope of Enlightenment. Read the blog to learn more.
Chase Snyder
2.12.21
Behavior-Based Detection and Rule-Based Detection: Why Not Both?
Learn how ExtraHop Reveal(x) combines behavior-based detection and rule-based detection to provide a covert defense against advanced threats.
Chase Snyder
9.4.20
How to Respond to Incidents Quickly Despite Intentionally Confusing False Flags
False flags are deliberately planted details meant to distract or mislead investigators. Learn what to look out for and how to get more context.
Chase Snyder
9.1.20
Strange Behavior: The Case for Machine Learning in Cybersecurity
What is the use case for machine learning in cybersecurity? Detecting unusual behavior that other approaches miss. See how ExtraHop is using ML for NDR.
Chase Snyder
8.28.20
How To Monitor Sensitive Data & Stop Exfiltration via The Network
Learn how NDR can monitor sensitive data movement in the enterprise network to stop breaches and catch insider threats before they exfiltrate data.
Chase Snyder
8.20.20
How To Get a Complete Inventory of Devices on Your Network
Device inventory is vital to security, and is the first requirement of the CIS Top 20 security controls, but current inventory tech leaves huge blind spots. How can you get a better inventory without undue management hassle?
Chase Snyder
7.28.20
Remote Work Isn't Going Away. Here's How to Secure WFH For The Long Haul
After the rapid shift to remote work, it's time to look toward maintaining the security of work-from-home infrastructures for the long haul. A recent SANS study and accompanying webinar discuss how.
Chase Snyder
7.13.20
Gartner Report on Handling Challenges with TLS 1.3 and Passive Decryption
Learn how Gartner, in its in-depth report, delves into the options and trade-offs available to businesses as they consider the transition to TLS 1.3.
Chase Snyder
7.2.20
How Reveal(x) Network Detection & Response Makes MITRE ATT&CK Easier
Network detection and response (NDR) is a vital tool for broad, deep MITRE ATT&CK Framework coverage. This short post and three minute video shows how Reveal(x) integrates MITRE ATT&CK into threat investigations.
Chase Snyder
6.3.20
Cloud-Native NDR & EDR With CrowdStrike and ExtraHop
CrowdStrike and ExtraHop have partnered to provide integrated cloud-native NDR + EDR. Detect and respond to attacks while addressing new vulnerabilities.
Chase Snyder
5.29.20
What's Worse? RDP Open to the Internet or Closing Up Shop? RDP Best Practices to Follow in 2020
Enabling remote desktop protocol has been important to support work-from-home access in 2020. Read five best practices to follow for the RDP protocol.
Chase Snyder
4.22.20
Most Security Pros Wish Their Company Did More Threat Hunting. Here's How They Can.
Why is proactive threat hunting valuable but underused? Find out in the results of Cybersecurity Insiders' new threat hunting survey, and get strategies for your SOC.
Chase Snyder
3.18.20
ISC(2) Webcast: Using MITRE ATT&CK In Hybrid and Cloud Environments
This webinar addresses how to achieve greater security in cloud and hybrid environments using the MITRE ATT&CK Framework.
Chase Snyder
3.10.20
The ExtraHop Reveal(x) Demo: NDR At Your Fingertips
The online demo of ExtraHop Reveal(x) is completely free and ungated, putting you right in the product to hunt threats and investigate anomalies. Here's how (and why) we built it.
Chase Snyder
3.2.20
Threat Investigation Speed Run with ExtraHop Reveal(x)
Watch the 2-minute video to see how quickly security teams can detect, investigate, and resolve a threat like ransomware using ExtraHop Reveal(x).
Chase Snyder
2.11.20
Announcing ExtraHop Reveal(x) for Midsize Enterprises
Protect your midsize enterprise with affordable ExtraHop Reveal(x) subscription packages, plus Reveal(x) Advisor for security analyst support.
Chase Snyder
10.8.19
Network Detection & Response (NDR) for NIST
Learn how to use the NIST Cybersecurity Framework, and how network detection and response (NDR) with ExtraHop Reveal(x) can help.
Chase Snyder
9.26.19
How Decryption Helped Beat the Nazis
Learn about one of the key infosec lessons from WWII: message content matters. Here's why.
Chase Snyder
9.12.19
Network Detection & Response vs. Network Traffic Analysis
NDR products use NTA, but add historical data for investigations, threat hunting, and automated threat response.
Chase Snyder
8.26.19
How Orgs Should Approach Shadow IT (& How NDR Can Help)
Shadow IT is inevitable, but zero tolerance policies aren't the answer. Learn the smart, secure, and scalable approach to dealing with shadow IT.
Chase Snyder
7.11.19
2019 SANS SOC Survey Results
Learn how your SecOps peers are approaching threat-detection and response in the hybrid enterprise, and more!
Chase Snyder
7.1.19
How to Apply CIS Controls & MITRE ATT&CK in the Cloud
A crash course in how to solve the top 3 challenges you'll face in applying security control frameworks to the hybrid cloud.
Chase Snyder
6.11.19
What Is Cross-Site Scripting (XSS) & How To Prevent It
Cross-site scripting (XSS): Sketchy links from suspicious-looking emails or a shortened URL from your social feed can play a part in this security threat.
Chase Snyder
4.29.19
Basic Threat Hunting with Reveal(x)
Watch this 5-minute video to see how ExtraHop Reveal(x) network detection and response makes it simple to proactively search for and investigate potential threats like risky database and DNS activity.
Chase Snyder
4.11.19
Network Detection & Response for MITRE ATT&CK
The MITRE ATT&CK Framework helps security teams evaluate threat detection tools against real-world adversary tactics, techniques, and procedures (TTPs). Learn how network detection & response (NDR) tools like Reveal(x) detect more TTPs, faster, than other solutions.
Chase Snyder
4.10.19
Real Answers to Real Questions About AI
ExtraHop answers five of Gartner's recommended questions that CISOs should ask before adopting AI or, more accurately, machine learning.
Chase Snyder
2.13.19
Network Detection & Response (NDR) vs. SIEM
Network detection & response (NDR) vs. SIEM: What are the key differences, and how can these two security solutions work together for a proactive, cost-effective, and scalable SOC?
Chase Snyder
2.7.19
Network Detection & Response (NDR) vs. Intrusion Prevention Systems (IPS)
Compare network detection & response (NDR) products to traditional security solutions with this bakeoff between NDR and intrusion prevention systems (IPS).
Chase Snyder
1.23.19
Network Detection & Response (NDR) vs. Intrusion Detection Systems (IDS)
Learn how network detection & response (NDR) products compare to intrusion detection systems.
Chase Snyder
10.5.18
Network Traffic Analysis for Enterprise Security
Watch this 6 minute video to learn exactly what sets enterprise-class network traffic analysis products apart from the basic definition of the category and which capabilities are required to be truly best-of-breed.
Chase Snyder
9.18.18
DDoS Protection Primer: Types and Mitigation Explained
Get to know the latest about DDoS attacks by learning about attack types, mitigation strategies, and how to protect your website.
Chase Snyder
6.25.18
What Is Network Traffic Analysis (NTA)?
Learn Gartner's definition of network traffic analysis (NTA) and how this process relates to network detection and response (NDR) in enterprise cybersecurity.
Chase Snyder
12.18.17
What Is Dwell Time in Cyber Security?
Learn how dwell time in security can hurt your programs and find out how to be proactive to reduce dwell time.
Chase Snyder
7.27.16
The End of Briforum and the Future of Monitoring on Brian Madden's Penultimate Podcast
Listen in on a great conversation between virtualization legends Brian Madden and John Smith.
Chase Snyder
9.4.15
What Is Wire Data? (Video)
Take a minute and a half to learn what wire data is, and why it is the linchpin of successful IT operations analytics (ITOA).
Chase Snyder
8.27.15
What is FHIR (Fast Healthcare Interoperability Resources)?
Learn what FHIR is, how it relates to the HL7 protocol, and standards you should know about this way of exchanging healthcare information electronically.
Chase Snyder
5.4.15
Real-User Monitoring's Next Frontier: Context, Context, Context!
Data derived from traditional RUM solutions lacks context. ExtraHop merges RUM metrics from Boomerang.js with wire data insights for more relevant results.
Chase Snyder