Security Operations

Secure From the Inside: Keep Incidents From Being Breaches

ExtraHop's Jamie Moles on How to Spot and Stop Even Subtle Intrusions
Jamie Moles, Senior Technical Marketing Manager at ExtraHop

All activity online leaves a trail, but attackers are increasingly stealthy in how they 'live off the land.' Jamie Moles of ExtraHop lays out how to spot even subtle intruders and prevent a security incident from expanding into a full-blown breach.

In this video interview with Information Security Media Group, Moles discusses:

  • The disparity between spending on prevention and on response;
  • The keys to detecting even subtle intrusions;
  • How to prevent an incident from becoming a breach.

Moles brings more than 30 years of technology and cybersecurity experience to his role as senior technical manager at ExtraHop, where he helps customers understand and mitigate the risk contemporary threats pose to their business. In the early 1990s, he was one of the UK's leading experts on computer viruses, authoring his own virus scanner before joining Symantec as technical lead for their cybersecurity product range. He’s also held numerous engineering roles at organisations across a variety of industries including healthcare, infrastructure, and finance. In his spare time, he enjoys retro gaming, poker, and virtual reality.

About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing, you agree to our use of cookies.