About
This bio was provided during this employee's time at ExtraHop and does not reflect any current positions or experience.
About Tyson
Tyson helps to educate the IT Operations Management community about what is possible with real-time analysis of wire data. Prior to ExtraHop, Tyson worked as a technical marketing writer for Microsoft, Seagate, and the Association of Computing Machinery, where he wrote for and edited the TechNews e-mail newsletter from 2000 to 2005. You can find him on Twitter under @tsupasat.
Posts
5.21.20
Collaboration in Crisis: How to Bring IT and Cybersecurity Teams Together
Dark Reading recently took a measure of the relationship between IT and Security teams. See at the results of the survey and learn best practices from our expert panel.
Tyson Supasatit
3.20.20
Remote Access Considerations: How to Ensure Availability and Security for Remote Workers
The COVID-19 pandemic is driving people to work from home and straining remote access infrastructure. Here's how IT and Security teams can cope.
Tyson Supasatit
2.6.20
How to Easily Spot LDAP Clear Text Binds Before the Windows Update
Sending LDAP passwords in clear text was never a good idea, but a Windows update due in the second half of 2020 will make it also painful. Learn how to spot applications that will be affected.
Tyson Supasatit
8.14.19
Can You Encrypt Telnet?
Telnet sessions between client and server are not encrypted, leaving vulnerabilities. ExtraHop shares how to to encrypt telnet as well as secure alternatives.
Tyson Supasatit
6.27.19
What Traffic Mirroring Means for Cloud Security
Learn why traffic mirroring in the public cloud (like Amazon VPC Traffic Mirroring) is the best news in years for security teams using AWS or Azure.
Tyson Supasatit
6.25.19
How Traffic Mirroring in the Cloud Works
Learn how the availability of traffic mirroring in the public cloud fills critical network visibility gaps for enterprise security teams using AWS or Azure.
Tyson Supasatit
6.3.19
Five Reasons to Integrate SecOps & NetOps
Learn why you should break down the barriers between Security Operations (SecOps) and Network Operations (NetOps) and align their tools, processes, and skills.
Tyson Supasatit
3.14.19
How Network Detection & Response Supports the CIS Top 20 Controls
Learn how network detection & response (NDR) solutions are the easiest way to get the most CIS Top 20 Control coverage in a short amount of time.
Tyson Supasatit
2.12.19
Show and Tell: What a Live Attack Simulation Looks Like in Reveal(x)
Our online demo now features a live attack simulation where you can observe a hacker doing her job: exploiting a Drupal vulnerability, installing custom executables through PsExec, and more.
Tyson Supasatit
11.15.18
Decrypt Perfect Forward Secrecy with F5 BIG-IP and ExtraHop
Learn how to use F5 BIG-IP to capture perfect forward secrecy session keys and forward them to ExtraHop in order to passively analyze PFS-encrypted network traffic.
Tyson Supasatit
5.11.18
TLS 1.3: Will Your Network Monitoring Go Blind?
Learn how to maintain IT and security visibility with the required TLS 1.3 perfect forward secrecy encryption. Watch this webinar to learn more.
Tyson Supasatit
4.15.18
How ExtraHop Analyzes 1 PB+ Per Day Without Breaking a Sweat
If you can't scale your analytics platform to match cloud adoption and unprecedented data growth, you'll be making IT and security decisions based on guesswork. Learn how ExtraHop analyzes over 1 PB of data per day, and why that scalability matters.
Tyson Supasatit
11.2.17
The Network Engineer's Guide to the Galaxy...of Application Teams
Network engineer Rasika Nayanajith shares his experience using ExtraHop to gain credibility with application teams.
Tyson Supasatit
4.27.17
Lightboard Video: The Silent Scream in Your Datacenter
Monitoring your data combined with security measures, improve your tactical data timeline.
Tyson Supasatit
3.14.17
Data Gravity: What It Is and Why You Should Care
How to solve the problem of data gravity using machine learning for cloud analytics.
Tyson Supasatit
10.27.16
Don't Trust Log Data! Lessons from the Cryptonomicon
It's been clear for decades that logs are flawed when it comes to security. Even the cyberpunks in Cryptonomicon knew it. What should you use instead?
Tyson Supasatit
8.13.15
How Lockheed Martin Uses Wire Data For Situational Awareness
Eric Sharpsten, CTO of Lockheed Martin's Federal Health practice, discusses how his organization gains visibility in large, dynamic IT environments.
Tyson Supasatit
5.29.14
Server Decommissioning: Wait, We Have How Many DNS Servers?!
ExtraHop auto-discovers and classifies every device transacting on a network. Auto-discovery makes it easy to identify and decommission legacy DNS, web, and other servers.
Tyson Supasatit
2.15.14
Paying Down Technical Debt in Your IT Infrastructure
It is difficult to allocate resources to eliminating waste in the IT environment, but ExtraHop can make continuous improvement efforts easier.
Tyson Supasatit
9.18.13
Transaction Tracing for Web Gateways, Load Balancers, and Other Proxies
A web security company used ExtraHop to pinpoint the cause of latency for its web gateway/proxy SaaS offering using recognize-and-trace transaction tracing.
Tyson Supasatit