Thursday, August 15, 2019

August News: Security Advisory on Phoning Home Data

Read the Free Report + 2019 SANS SOC Survey Results & More ---
August 2019
ExtraHop - News to Know
Security Advisory: How Vendors Use Data

How Are Vendors Using Your Data?

What You Don't Know Could Hurt You

Security, IT, and application vendors "phoning home" data is a common practice, but it can pose risks to security, privacy, and compliance if it's done without consent. Read our security advisory to see four real-world examples of phoning home without authorization, plus get remediation tips, data best practices, and questions you should ask your vendors.

Download the Advisory

2019 SANS SOC Survey


The State of the Security Operations Center

See what security pros consider their biggest barriers to achieving SOC excellence, how quickly SOCs are moving to the cloud, and which detection tools are doing the best job of driving practitioner satisfaction. Download the complimentary SANS report for more key findings and SOC best practices.

Download the SANS Report
EMA Research

Network Detection & Response in the Cloud

Legacies are great to leave behind, especially if they're legacy products that aren't designed for cloud security. New research from EMA explains how, with the introduction of traffic mirroring and virtual network taps, cloud-native network detection and response (NDR) solutions such as ExtraHop Reveal(x) Cloud can help security teams overcome the challenges of visibility at cloud scale.

Read the EMA Report
EMA Report
Encryption

The Race to Enable TLS 1.3

Why are 74% of organizations adopting TLS 1.3 encryption with perfect forward secrecy? What are the security concerns created by stronger encryption? Check out the results of EMA's 2019 TLS 1.3 adoption survey.

 
See the Infographic
Video
Decryption

What's In the Box?

Some vendors argue that network detection & response products (NDR) can provide all the insight and threat detections you need without decrypting traffic. See why we think that's akin to shaking a box as a way to understand what's inside.

 
Watch the Video
Customer Spotlight

Lawrence Livermore National Laboratory

Scientists from around the world visit Lawrence Livermore National Laboratory's National Ignition Facility (NIF) to conduct experiments that can lead to world-changing breakthroughs. Watch the video to see how ExtraHop helps NIF's Security and IT teams proactively protect and optimize their environment.

Watch the Video
What's Next
August 25‒29

VMworld – San Francisco, CA

August 27

CyberSecurity Summit – Chicago, IL

September 9–11

Evanta Global CISO Executive Summit – Los Angeles, CA

September 22–24

Elite UK CISO Summit – Bath, UK

On Demand

SANS Webinar: The State of Cloud Security

 
Good Reads

SiliconANGLE: Grown up Cloud Security Is Built In,
Lives All Over the Network

Security Lessons from the Raspberry Pi Attack

eBook: ExtraHop's Guide to Application Analytics & APM Products

It's Time for Security Leadership to Embrace Cloud-First Security

Start the Reveal(x) Demo

View as a web page.

To unsubscribe from future emails or to update your email preferences click here.

ads

Ditulis Oleh : Angelisa Vivian Hari: 9:04 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive