NEW

The True Cost of a Security Breach

Arrow pointing right
ExtraHop Logo
  • Productschevron right
  • Solutionschevron right
  • Why ExtraHopchevron right
  • Blogchevron right
  • Resourceschevron right

Arrow pointing leftBlog

Jesse Munos

Former Employee - Technical Marketing Manager

About Jesse

Jesse Munos is a Technical Marketing Manager at ExtraHop, focusing on cybersecurity and cloud products.

Posts by this author

Beating Ransomware in the Midgame: Detection Best Practices in 2022

April 5, 2022

Learn the 2022 best practices for defeating ransomware where defenders have the advantage—in the midgame.

What You Need to Know about BlackByte Ransomware as a Service

February 18, 2022

BlackByte is the latest ransomware group making headlines. Learn their playbook and how you can build an effective defense strategy.

Detecting Attacks Using Microsoft Protocol Decryption

October 14, 2021

Microsoft Active Directory is a favorite target for attackers, and traditional threat detection techniques are falling short. Learn why and what you can do.

Detect Malware in Encrypted Traffic for Improved Security Visibility

September 28, 2021

Encryption gives attackers dark places to hide. Learn which common solutions for network visibility fall short, and which can accurately detect advanced threats.

Why Decryption Is Necessary for Security

September 14, 2021

Encryption is central to modern security architecture, but it also allows attackers to conceal their activity. Learn why secure decryption is also the key to effective cyberdefense.

Methods for Security Automation and Improving MTTR

July 1, 2021

Learn how automating asset containment can improve response times and strengthen security.

Alerts That Matter: Knowing When (and How) to Take Decisive Action

September 11, 2020

Sophisticated cyberattacks go undetected for weeks or months, and when discovered, security analysts struggle to contain the compromise and assess its scope. Most detection tools are able to create incident tickets, but noisy detections quickly become "ticket spam" and contribute to the security analyst's challenge of rising above the noise.

Uncovering the Unknown: Proactive, Covert Identification of Evasive Threats

August 27, 2020

Attackers are constantly evolving their tactics and techniques to avoid detection. But attackers can't eliminate all traces of their activities. Here is how ExtraHop Reveal(x) streamlines the threat hunting process.

XDR vs. NDR

August 7, 2020

Get some clarity on the alphabet soup of security vendor acronyms by reading this in-depth comparison of network detection and response (NDR) and extended detection and response (XDR).

SIGRed: What Is It, How Serious Is It, and How Should You Respond?

August 7, 2020

Learn about this critical vulnerability including how it works, how to detect it, and what remediation steps you can take.

Debunking the Myths on NDR Selection Criteria

June 3, 2020

Learn about the myths often spread by network detection & response vendors to hide gaps in functionality, & how to evaluate a best-of-breed NDR tool.

ExtraHop Reveal(x) + CrowdStrike Integration: How It Works

June 3, 2020

Learn how to speed up threat response by combining powerful network detection & response from ExtraHop with network containment capabilities from CrowdStrike.

6 New Features to Look for in Network Detection and Response

April 3, 2020

Learn about 6 new features a best-of-breed network detection and response (NDR) platform should offer in a video walkthrough using ExtraHop Reveal(x).

Citrix ADC Vulnerability: CVE-2019-19781

January 24, 2020

Learn how to detect and remediate this critical Citrix Gateway vulnerability as well as how it works.

Experience RevealX NDR for Yourself

Schedule a demo