About
This bio was provided during this employee's time at ExtraHop and does not reflect any current positions or experience.
About Jesse
Jesse Munos is a Technical Marketing Manager at ExtraHop, focusing on cybersecurity and cloud products.
Posts
4.5.22
Beating Ransomware in the Midgame: Detection Best Practices in 2022
Learn the 2022 best practices for defeating ransomware where defenders have the advantage—in the midgame.
Jesse Munos
2.18.22
What You Need to Know about BlackByte Ransomware as a Service
BlackByte is the latest ransomware group making headlines. Learn their playbook and how you can build an effective defense strategy.
Jesse Munos
10.14.21
Detecting Attacks Using Microsoft Protocol Decryption
Microsoft Active Directory is a favorite target for attackers, and traditional threat detection techniques are falling short. Learn why and what you can do.
Jesse Munos
9.28.21
Detect Malware in Encrypted Traffic for Improved Security Visibility
Encryption gives attackers dark places to hide. Learn which common solutions for network visibility fall short, and which can accurately detect advanced threats.
Jesse Munos
9.14.21
Why Decryption Is Necessary for Security
Encryption is central to modern security architecture, but it also allows attackers to conceal their activity. Learn why secure decryption is also the key to effective cyberdefense.
Jesse Munos
7.1.21
Methods for Security Automation and Improving MTTR
Learn how automating asset containment can improve response times and strengthen security.
Jesse Munos
9.11.20
Alerts That Matter: Knowing When (and How) to Take Decisive Action
Sophisticated cyberattacks go undetected for weeks or months, and when discovered, security analysts struggle to contain the compromise and assess its scope. Most detection tools are able to create incident tickets, but noisy detections quickly become "ticket spam" and contribute to the security analyst's challenge of rising above the noise.
Jesse Munos
8.27.20
Uncovering the Unknown: Proactive, Covert Identification of Evasive Threats
Attackers are constantly evolving their tactics and techniques to avoid detection. But attackers can't eliminate all traces of their activities. Here is how ExtraHop Reveal(x) streamlines the threat hunting process.
Jesse Munos
8.7.20
XDR vs. NDR
Get some clarity on the alphabet soup of security vendor acronyms by reading this in-depth comparison of network detection and response (NDR) and extended detection and response (XDR).
Jesse Munos
8.7.20
SIGRed: What Is It, How Serious Is It, and How Should You Respond?
Learn about this critical vulnerability including how it works, how to detect it, and what remediation steps you can take.
Jesse Munos
6.3.20
Debunking the Myths on NDR Selection Criteria
Learn about the myths often spread by network detection & response vendors to hide gaps in functionality, & how to evaluate a best-of-breed NDR tool.
Jesse Munos
4.3.20
6 New Features to Look for in Network Detection and Response
Learn about 6 new features a best-of-breed network detection and response (NDR) platform should offer in a video walkthrough using ExtraHop Reveal(x).
Jesse Munos
1.24.20
Citrix ADC Vulnerability: CVE-2019-19781
Learn how to detect and remediate this critical Citrix Gateway vulnerability as well as how it works.
Jesse Munos