about - Media coverage

Media coverage published in 2019

Who’s Responsible for Securing IoT Medical Devices?

May 16, 2019

MedTech Intelligence

“Long-term industry efforts are essential in closing the gaps in the device ecosystem,” says Chris Morales, head of security analytics at Vectra.

Read article

Flexa Launches Crypto-Based Payment App

May 14, 2019

E-Commerce Times

Cryptocurrencies are the root of the payment platform rather than actual currency, explained Chris Morales, head of security analytics at Vectra. They are not stable and are traded like assets as the price has wild fluctuations in value every day.

Read article

How Medical Device Companies Can Safeguard Vital IP

May 13, 2019

Health IT Outcomes

The economic damage of IP theft to U.S. companies is estimated at over $300 billion per year, according to an IP Commission Report, issued by the Commission on the Theft of American Intellectual Property.

Read article

The Security of Connected Medical Devices

May 10, 2019

Business News Daily

"Lots of IoT devices, coupled with the free flow of patient data in the network, create massive internal blind spots about what's happening," said Chris Morales, head of security analytics at Vectra.

Read article

Sophisticated Spam

May 10, 2019

USA Today

Ransomware affects all industries. Vectra collected data from multiple companies in nine sectors between January 2018 and February 2019.

Read article

DHS Releases Analysis of ELECTRICFISH Malware

May 10, 2019

Infosecurity Magazine

“This type of connection, using a custom protocol instead of existing protocols like HTTP, is what we refer to as hidden tunnels and is used for command and control of remote systems, as well as for data exfiltration,” said Chris Morales, head of security analytics at Vectra.

Read article

How to Meet the Growing Demand for Cybersecurity Professionals

May 10, 2019

Security Magazine

According to Mike Banic, Vice President of Marketing at Vectra, “One of the things we find in Ireland is there are a lot of engineers that have great cloud skill sets,” he says. “They have cyber experience and the platform-level experience we need for cloud. Having those skills allows us to have the team take ownership of a complete product.”

Read article

Can Data Inventory Reduce Medical Device Risk to Patient Safety?

May 8, 2019

Health IT Security

Medical devices and legacy systems are some of the healthcare sector’s most vulnerable areas when it comes to keeping patient data and networks secure, according to a recent report from Vectra that analyzed recent cyber incidents across the industry.

Read article

Ransomware hit from top spot as cyber security danger

May 8, 2019

GDPR Report

The findings come from the Vectra 2019 Spotlight Report on Healthcare, which highlighted the vulnerability of the IoT devices. Connected gadgets have now become a target for malicious online operators seeking to disrupt organisations or get their hands on private personal information.

Read article

Ransomware no longer biggest cyber security threat, report finds

May 7, 2019

Digital Health Intelligence

The Vectra 2019 Spotlight Report on Healthcare identified Internet of Things (IoT) devices; unpartitioned networks; and reliance on out-dated systems, as weakness most likely to be exploited by cybercriminals looking to steal personal information and disrupt organizations.

Read article

Tech firms race to get a camera in every home: Here’s how to protect your privacy

May 7, 2019

The Telegraph

Matt Walmsley, EMEA Director at cybersecurity business Vectra, said: “Don’t just click through and accept the T&Cs without reading them. Look for options to manage the recording including limiting usage, sharing, and deletion, particularly if stored externally out in the cloud.”

Read article

Lack of AI Security Puts IoT Medical Devices in Danger of Cyberattacks

May 6, 2019

Healthcare Business

“Healthcare organizations struggle with managing legacy systems and medical devices that traditionally have weak security controls, yet both provide critical access to patient health information,” said Chris Morales, head of security analytics at Vectra.

Read article

Healthcare Industry at Risk Due to IoT Devices and Human Error

May 6, 2019

Security Magazine

"Healthcare IT security teams are often kept in the dark and behind the curve when it comes to changes in infrastructure,” says Chris Morales, Head of Security Analytics, Vectra. 

Read article

Cybersecurity Experts Share Tips and Insights for World Password Day

May 2, 2019

Forbes

“Many websites offer easy to remember questions with information such as mother’s maiden name or favorite pets names to reset a password. This is the kind of data that could be easily attained using social media,” says Chris Morales, head of security analytics at Vectra.

Read article

Everything Is Best When It Comes to Cybersecurity Best Practices

May 2, 2019

Security Intelligence

Cybersecurity best practices are often driven by the vendor community within information security, but they are nothing more than a set of methodologies and processes based on the theory of what will allow a company to stop or contain a breach, according to Chris Morales, head of security analytics at Vectra.

Read article

Do Not Use: Top 15 'Worst Passwords'

May 2, 2019

Secure World

"I understand the intent of providing a black list of passwords users should not use. However, I think the larger problem is that passwords are a poor choice of authentication and we are stuck with it," says Chris Morales, head of security analytics at Vectra.

Read article

Report Says IoT Proliferation and Insufficient Access Controls Exposing Healthcare Systems to Data Theft

May 1, 2019

Biometric Update

“Healthcare organizations struggle with managing legacy systems and medical devices that traditionally have weak security controls, yet both provide critical access to patient health information,” says Chris Morales, head of security analytics at Vectra.

Read article

Human Error, Not Ransomware, Health Care’s Biggest Security Threat

April 30, 2019

Security Boulevard

According to the Vectra report, the most common method attackers use to hide exfiltration behaviors in healthcare networks is hidden DNS tunnels.

Read article

Legacy Systems, Devices Emerge as Security ‘Weak Links’

April 29, 2019

Health Data Management

Vectra’s 2019 Spotlight Report on Healthcare is based on observations and data from the 2019 RSA Conference Edition of the Attacker Behavior Industry Report, which reveals behaviors and trends in networks from a sample of 354 opt-in enterprise organizations in healthcare and eight other industries.

Read article

Legacy Systems, Employee Error Leave Hospitals, Devices Vulnerable to Cyberattacks

April 29, 2019

MedTech Dive

Security risks associated with the healthcare internet of things (IoT) are exacerbated by unpartitioned networks, inadequate access controls and reliance on legacy systems, according to the Vectra 2019 Spotlight Report on Healthcare.

Read article

Cyber-security: how the health sector is attacked

April 28, 2019

MSN

In its  "Spotlight" report on IT threats targeting the health sector,"'  Vectra confirms the exposure of the medical ecosystem to cyber attacks.

Read article

Morning eHealth

April 26, 2019

POLITICO

A report from cybersecurity company Vectra suggests that human error poses a bigger cyber risk than hacking in health care, including when people accidentally send health information to the wrong recipient.

Read article

Legacy Systems, Employee Error Leave Hospitals, Devices Vulnerable to Cyberattacks

April 26, 2019

Healthcare Dive

Errors such as improper handling and storage of patient files, often due to poor organizational policies and procedures, leave IT systems and connected medical devices vulnerable to outside attack and manipulation, new research from Vectra warns.

Read article

Hospitals Can Leverage AI to Combat Cyberattacks, Report Finds

April 26, 2019

Becker’s Hospital Review

The Vectra healthcare report explored the behaviors and trends from 354 opt-in enterprise organizations in healthcare and eight other industries. From July to December 2018, Vectra monitored network traffic and collected metadata from more than 3 million workloads and devices.

Read article

Cyber-security: how the health sector is attacked

April 26, 2019

Silicon.fr

According to Vectra, the number of vulnerabilities has increased significantly in the health sector. At issue: the presence of many connected objects (IoT) and weak access controls.

Read article

Vectra: How do cyber criminals hack health organizations?

April 26, 2019

MtoM Mag

Vectra, a leading player in the detection of cyber attacks and the neutralization of artificial intelligence threats, releases its "Spotlight" report on IT threats targeting the health sector.

Read article

IoT News of the Week for April 26, 2019

April 26, 2019

Stacey on IoT

This report from security firm Vectra takes a look at the expanding attack surface in hospitals, but it also pulls in a lot of charts and data about attacks and the types of threats facing other industries as the embed more technology into their operations, and as more of them become targets for ransomware or hacks.

Read article

The hunter's sleep gives birth to monsters

April 25, 2019

LanLine

"In general, the way in which one evaluates one's own security concepts is much closer to the actual behavior of the attackers," reports Tobias Schubert, Senior Security Engineer at Vectra.

Read article

Report: AI, Machine Learning Key to Securing Healthcare’s Vulnerable Attack Surfaces

April 25, 2019

Healthcare Innovation News

Healthcare organizations’ vulnerable attack surfaces can be better secured by utilizing machine learning and artificial intelligence (AI) to detect hidden threat behaviors, according to a new report from IT security company Vectra.

Read article

Connected Devices, Legacy Systems Leave Hospitals Wide Open to Cyber Attack

April 25, 2019

Healthcare IT News

The study, based on network traffic data monitored by Vectra over a six-month period, found the most prevalent method attackers use to hide command-and-control communications in healthcare networks was hidden HTTPS tunnels.

Read article

Regulations, Insider Threat Handicap Healthcare IT Security

April 25, 2019

Dark Reading

"Healthcare is the one industry that doesn't have to worry about the attacker on the outside as much as the attacker on the inside," says Chris Morales, head of security analytics at Vectra. 

Read article

Healthcare facilities are vulnerable to cyberattacks

April 25, 2019

Funkschau

"The growth of the medical internet of things is beneficial for the patients. Protecting healthcare systems, however, poses a challenge as security controls on these devices are limited, "notes Brett Walmsley, Chief Technology Officer of the Bolton NHS Foundation Trust.

Read article

A vulnerable attack surface exists in healthcare enterprise IT networks

April 25, 2019

Digitalisation World

From July through December 2018, the Cognito threat-detection and response platform from Vectra monitored network traffic and collected metadata from more than three million workloads and devices from customer cloud, data center and enterprise environments.

Read article

Legacy infrastructures and unmanaged devices top security risks in the healthcare industry

April 25, 2019

Help Net Security

Published in the Vectra 2019 Spotlight Report on Healthcare, these findings underscore the importance of utilizing machine learning and artificial intelligence to detect hidden threat behaviors in enterprise IT networks before cybercriminals have a chance to spy, spread and steal.

Read article

Vectra presents research on cybersecurity in healthcare industry

April 25, 2019

Intelligent CISO

The Cognito platform accelerates network threat detection and response using sophisticated Artificial Intelligence to collect, enrich and store network metadata with the right context to detect, hunt and investigate hidden threats in real time.

Read article

How do cybercriminals hack into health organizations

April 25, 2019

Undernews

The Spotlight Report on Healthcare is based on observations and data from a broader Vectra report from 354 companies in 8 different industries, including health. This report highlights the behaviors and trends observed in these companies' networks.

Read article

IT networks of healthcare facilities have weak points

April 25, 2019

Computerwelt

"Machine learning and AI can help healthcare organizations better secure networks, workloads, and devices. Cross-system vulnerability analysis provides holistic data security, "said Jon Oltsik, Senior Principal Analyst, Enterprise Strategy Group.

Read article

IoT devices put healthcare networks at risk

April 24, 2019

Beta News

"Healthcare organizations struggle with managing legacy systems and medical devices that traditionally have weak security controls, yet both provide critical access to patient health information," says Chris Morales, head of security analytics at Vectra.

Read article

Vectra: Healthcare IoT Devices and Unsecured Networks Make Industry a Target for Cyber Attacks

April 24, 2019

Tech Nadu

“When you factor in how long it takes to discover a digital breach and a lean security staff in many healthcare providers, it becomes apparent that healthcare needs the awareness of what happens inside their network to quickly know the difference between what is an attack or business as usual,” Chris Morales, head of security analytics at Vectra.

Read article

Healthcare Internet of Things Can Expose Networks, Data to Attacks

April 24, 2019

HIT Infrastructure News

To conduct the study, Vectra monitored network traffic and collected metadata from its Cognito platform customers. The analysis of the metadata provided a better understanding about attacker behaviors and trends as well as business risks.

Read article

Vectra Report Finds Vulnerable Attack Surfaces Exist in Healthcare Enterprise IT Networks

April 24, 2019

VM Blog

Vectra announced that the proliferation of healthcare internet-of-things (IoT) devices, along with unpartitioned networks, insufficient access controls and the reliance on legacy systems, has exposed a vulnerable attack surface that can be exploited by cybercriminals determined to steal personally identifiable information (PII) and protected health information (PHI), in addition to disrupting healthcare delivery processes.

Read article

Insider Threats a Top Risk to Healthcare

April 24, 2019

Infosecurity Magazine

“Improving visibility into network behavior enables healthcare organizations to manage risk of legacy systems and new technology they embrace,” says Chris Morales, head of security analytics at Vectra.

Read article

Vulnerable IT in healthcare

April 24, 2019

IT-Administrator

Vectra beobachtete einen Anstieg der internen Auskundschaftung im Gesundheitswesen, zurückzuführen auf interne Darknet-Scans und Scans von Microsoft Server Message Block (SMB)-Accounts.

Read article

UK's NCSC Suggests Automatic Blocking of Common Passwords

April 23, 2019

Security Week

"Easy to remember phrases are stronger than 12-digit passwords using numbers and characters,” says Chris Morales, head of security analytics at Vectra.

Read article

Is Privacy Really iPhone? Researchers Weigh in on Apple’s Targeted Ad Tracking

April 22, 2019

Threatpost

“IDFA does not identify the device or user, and was a replacement for the much less secure UDID,” explained Chris Morales, head of security analytics at Vectra.

Read article

Malware Attack Rains on Weather Channel’s Parade, Disrupts Live Broadcast

April 18, 2019

SC Magazine

“The quick recovery to a malware attack at The Weather Channel is attributed to restoring programming from back-up systems. This highlights the importance of disaster recovery and backup as part of an organization’s risk management strategy,” said Mike Banic, vice president of marketing at Vectra.

Read article

Jusqu’où l’intelligence artificielle peut-elle réduire le déficit d’experts en cybersécurité?

April 17, 2019

Solutions Numeriques

Grégory Cardiet, directeur Security Engineering chez Vectra pour la zone EMEA, défend son point de vue : l’IA peut combler une insuffisance technique en augmentant les capacités humaines au-delà des quantités ou des vitesses atteignables par des approches manuelles traditionnelles.

Read article

AI at the US Department of Homeland Security – Current Projects

April 16, 2019

Emerj

The use of the Cognito platform will allow state and local government bodies as well as 66 federal agencies to monitor for cybersecurity risks to its networks and IT systems continuously.

Read article

How Organizations Use Threat Intelligence To Boost Security

April 15, 2019

BrightTalk

What is cyber threat intelligence, and how can organizations leverage it to identify threats and potential malicious activity in advance? Discover the best ways organizations can arm themselves with actionable threat intelligence to block cyber attacks or mitigate their impact.

Read article

Mailgun Web Issues from WordPress Plugin Hack

April 12, 2019

Infosecurity Magazine

“The best advice I can give at this time is that users need to pay careful attention to the sites they do visit at any given time and be careful what information they are providing,” said Chris Morales, head of security analytics at Vectra.

Read article