About
About Dale
Dale Norris is a product marketing manager focused on cloud security. He's passionate about helping organizations understand how to protect themselves against advanced threats and cybersecurity risks that extend across cloud, multicloud, and hybrid environments.
Follow Dale on LinkedIn.
Posts
10.25.22
How Network Data Improves SOAR Capabilities
Learn how to enhance SOAR security tools with network packets and network threat intelligence from ExtraHop Reveal(x).
Dale Norris
9.22.22
What Is Cloud Security Posture Management (CSPM)?
Learn more about the strengths and weaknesses of cloud security posture management (CSPM) tools and discover how network detection and response (NDR) fills in CSPM gaps.
Dale Norris
9.12.22
Enhanced RDS Monitoring with Network Packets
Discover how to unlock deep Relational Database Service (RDS) visibility with Amazon VPC Traffic Mirroring and network packets.
Dale Norris
9.8.22
Seamlessly Integrate VPC Flow Logs for AWS Security
See how a new integration with Amazon Kinesis Data Firehose removes friction from ingesting VPC Flow Logs for cloud threat defense in AWS.
Dale Norris
8.23.22
What Is a Cloud Access Security Broker (CASB)?
Discover how cloud access security brokers (CASB) help secure cloud and hybrid environments, and how pairing them with network detection and response (NDR) supports a defense-in-depth strategy.
Dale Norris
8.15.22
Reducing Cloud Security Friction in the C-Suite Survey
Discover what an ExtraHop–sponsored survey tells us about the causes and effects of cloud security friction, and how it affects decision-making in the C-suite.
Dale Norris
8.2.22
What Is a Cloud Workload Protection Platform (CWPP)?
Learn how enhancing your cloud workload protection platform (CWPP) with NDR increases the visibility needed to mitigate advanced cloud threats.
Dale Norris
6.21.22
Gain PCAP and Forensics in Google Cloud
Friction traditionally associated with PCAP in the cloud slows incident response and makes forensics difficult. Discover how Reveal(x) 360 Ultra for Google Cloud solves the PCAP problem.
Dale Norris
11.4.21
Container Security: Definition, Best Practices, and Examples
ExtraHop explains how containers work, ways to secure containers, and shares examples of recent container attacks against large-scale organizations.
Dale Norris
8.9.21
Monitoring Critical Cloud Workloads
Get tips for taking a phased approach to securing your cloud environment in this new report from InformationWeek.
Dale Norris
7.12.21
See How Network Intelligence Tools Find Adversaries & Advanced Threats
IDC says network intelligence tools with visibility over an enterprise's entire cloud and hybrid surface provide insight that a slew of discrete tools cannot.
Dale Norris
6.30.21
Why You Need PCAP and Forensics in the Cloud
Packet capture (PCAP) for cloud forensic investigations - ExtraHop Reveal(x) 360 Ultra cloud sensors with continuous PCAP unlock forensics in AWS environments.
Dale Norris
5.20.21
2021 SANS Cloud Security Research
Discover the current state of cloud security in this new SANS report featuring results of a global survey of IT professionals.
Dale Norris
5.11.21
Adapt Your Defense Strategy to Stop Supply Chain Attacks
New SANS white paper explores how to build a comprehensive cyber defense plan to stop a supply chain attack and eliminate the attacker's advantage. Learn more.
Dale Norris
4.23.21
ExtraHop Reveal(x) 360 Ebook
Download the Reveal(x) 360 Ebook to explore hybrid and cloud security use cases and view on-demand and list pricing for ExtraHop Reveal(x) 360.
Dale Norris
4.6.21
New Cloud & Hybrid Security Research
What's the current state of cloud and hybrid security? Find out in this data-packed infographic with links to reports from SANS, Dark Reading, Forrester, and more!
Dale Norris
3.16.21
EMA on Securing Cloud Assets
Read new research from EMA on securing cloud assets. See how IT security pros grade their own progress. Read more from ExtraHop.
Dale Norris
2.18.21
SANS: A New Take on Cloud Shared Responsibility
There's more nuance to the shared responsibility model than you may realize. Get the latest on who's responsible for what.
Dale Norris
1.29.21
SANS 2020 Cloud Security Report | ExtraHop
Gain valuable insight into the tooling and migration trends to watch today and in the future with the newest report from the SANS Institute.
Dale Norris
1.14.21
What's the State of Hybrid and Cloud Security Tools?
Understand the current state of cybersecurity tooling from security and IT pros who shared their insights in our newest must-have report.
Dale Norris
10.29.20
Lessons Learned from Major Breaches
Explore in-depth case studies from the Cloud Security Alliance focused on nine headline-grabbing breaches that map to the "Egregious Eleven" of top cloud threats.
Dale Norris
7.1.20
MAPCO Gains Hybrid Visibility with ExtraHop
See how MAPCO uses Reveal(x) to keep customer credit card data secure while maintaining the availability of AWS and on-premises infrastructure and applications.
Dale Norris
4.28.20
Enhancing Cloud Security Against the Egregious 11
Learn how cloud-native NDR helps you detect and respond to the top security threats in the cloud. Read the CSA report and register for CSA's CloudBytes Connect virtual event.
Dale Norris
1.29.20
IDC Infographic: Implement Security for Cloud Superiority
See the reasons why organizations are adopting public cloud, how cloud security can divide stakeholders, and solutions to the top challenges created by public cloud.
Dale Norris
10.24.19
Artificial Intelligence: A Relative Reality
Read this SC Solutions tech report to separate marketing hype from reality while learning how AI and machine learning capabilities differ across security products and categories.
Dale Norris
10.10.19
Boost Your Security in AWS
Learn about AWS features such as AWS Nitro System, ENI, and VPC Traffic Mirroring used to implement network detection & response (NDR) in the cloud.
Dale Norris
9.11.19
NDR and the SOC Visibility Triad
Learn how network detection and response (NDR) completes the SOC Visibility Triad and complements EDR and SIEM tools.
Dale Norris
8.12.19
How Does Reveal(x) Detect Recon?
See how network detection and response (NDR) powered by network traffic analysis (NTA) detects reconnaissance activity in real time.
Dale Norris
7.22.19
How Does Reveal(x) Detect Threats?
See how network detection and response (NDR) powered by network traffic analysis (NTA) provides real-time detection of widely used exploitation behaviors like command & control.
Dale Norris
5.2.19
The OSI Model Explained
Explore the OSI Model's significance in 2024. ExtraHop will help you uncover layers, troubleshoot networks, and master Layer 7. Learn more here!
Dale Norris