Data science and machine learning will fight cyber-attacks, says Vectra Networks: 2015 Tech Predictions
Vectra VP of Marketing Mike Banic predicts data science and machine learning will become the focus of the fight on cyber-attacks, cyber security will get social, and new entrants will continue to disrupt the cyber security market.
Vectra X-series platform identifies threats in real-time
Real-time cyber-attack detector Vectra Networks has introduced a real-time detection platform for insider and targeted threats.
New products of the week 12.22.2014
Our roundup of intriguing new products from companies such as Dell, CloudBerry and Vectra (See Slide 16).
Breach detection, Sony Entertainment and Vectra Networks
Working in information security for the past 20 years, I have seen a lot. Though there have been many multi-million dollar impact breaches, the recent Sony Pictures hack and subsequent data exposure and extortion is probably the most impactful to a company out of the previous breaches this year.
Vectra releases real-time threat detection platform to protect against targeted attacks
Vectra Networks has released an updated real-time detection platform – X-series platform – aimed for insider and targeted threats detection.
Put the insider threat in your sights
Regardless of how well we secure our assets from outside parties, we ultimately need to give access to our employees, contractors and partners in order for them to do their jobs. Misuse of this privileged access, whether through data theft or damage, is an unfortunate, yet inherent risk of doing business for most organizations.
Vectra launches real-time detection platform to curb insider threats
Vectra Networks announced release of a real-time detection platform to protect organizations and government agencies from insider and target threats.
Vectra updates threat detection platform
The Vectra X-series platform is designed to detect sophisticated threats by using a combination of security research, data science and machine learning. According to the company, the product is capable of detecting attacks on all operating systems, applications and devices regardless of the method and location of the initial delivery.
Vectra launches real-time threat detection
Vectra Networks has released its updated X-series platform, the first real-time detection solution designed to discover insider and targeted threats. The new platform promises to help organizations gain instant visibility into potential threats by leveraging a combination of dynamic community threat analysis and real-time detection of cyberattacks.
Video: Tracking cyber threats from inside a company
CEO Hitesh Sheth tells Bloomberg TV's Pimm Fox how Community Threat Analysis dynamically creates a clear picture of typical network access through the entire corporate network, identifying anomalies and flagging unauthorized access to documents, data and intellectual property, making it an effective way of recognizing insider attacks.
Review: Vectra X-series prevents data breaches with AI
Frank Ohlhorst details how data breaches happen and what Vectra’s X-series security appliances can do to detect and prevent them.
An epic ride: A look back at the ever-changing information security industry
“We've gone from an environment where people were essentially stationary with fixed computing assets to one where everything is porous and people are mobile and applications and data and information are all in the cloud,” says Hitesh Sheth, president and CEO for Vectra Networks.
Industry reactions to devastating Sony hack
The systems of entertainment giant Sony have been hacked once again, and although the full extent of the breach is not yet known, the incident will likely be added to the list of most damaging cyberattacks.
The inner workings of a targeted attack
Vectra Networks' X-series of appliances combine advanced analytics with AI to identify threats in real time.
Vectra post-breach report reveals attacker habits
Ten percent of hosts experience at least one or more cyberattacks that bypass enterprise security perimeter defenses, according to a new study by security solution provider Vectra Networks.
NotCompatible mobile malware gets badder
The new "C" version of the NotCompatible malware that targets Android devices is very difficult to stop – but it's not that hard to avoid.
Targeted attacks cause damage in multiple ways
Overall, 15 percent of hosts in the participating organizations experienced a targeted attack, according to a Vectra Networks report.
Survey roundup: False sense of security?
A report by data security company Vectra Networks looks at how cybercriminals bypass perimeter defenses, andwhat they do inside a network once they have gained access.
Feedback Friday: Executives targeted in 'darkhotel' attacks
When it comes to the darkhotel issue and the fast-evolving threat landscape, "what the malware is doing" is more important than "what the malware is."
U.S. Postal Service employees, retirees, customers exposed in hack attack
There's speculation that China might be behind a months-long hack attack that breached USPS servers, compromising personal data of workers and customers.
What attackers do after bypassing perimeter defenses
Vectra Networks collected data over five months from more than 100,000 hosts within sample organizations to gain a deeper understanding of breaches that inevitably bypass perimeter defenses, and what attackers do once inside networks.
Study: Organizations assailed by cyber attacks, 15 percent are targeted
Highly organized, sophisticated and successful cyber attacks continue to assail organizations and while most are opportunistic, a higher than expected percentage are targeted, according to results from a recent study.
From malware to breach
Got malware? More than likely you do, but don't panic: The bulk of infections can be traced to standard botnet activity like spamming and click-fraud rather than data theft, a new study of real-world breaches has found.
BYOD and other hazards
Mobile technologies can be a boon to productivity, but they also introduce cyber-security vulnerabilities that technologists and insurers are laboring to protect.
What attackers do after a breach
An attack happens and he or she is able to squeeze by the perimeter defense; that is just the beginning for an assault on a network, a new report shows.
Vectra report reveals what attackers do once they bypass perimeter defenses
This is the first report, using real-world data from the Vectra X-series platforms currently in production networks, that reveals what attackers do within a network once they evade perimeter defenses.
Some U.S. retailers shun Apple Pay, eye rival payments system
Some large U.S. retailers are refusing to use Apple Inc's new electronic payments service as they commit to developing a rival payments system that would bolster their profits by eliminating credit card transaction fees.
Computer Technology Review Top 25 must-have software apps
Every year Computer Technology Review ranks the top 25 software applications that you absolutely must check out. This year, new-comer Vectra Networks is in the mix.
Cyber security goes mobile
Mobile technology advances have brought about the once-unfathomable prospect that wireless security is at least on a par with traditional computing and networking systems – the very ones currently fending off an unprecedented wave of cyberattacks.
Detecting cyber attacks in a mobile and BYOD organization
Explore the challenges, understand needs and evaluate mobile device management as an approach to detecting attacks. It can lead to a flexible, highly efficient solution that detects all phases of an active attack on mobile devices, regardless of device type, operating system or applications installed.
New bash bugs surface
If you patched your Linux-based systems before 1:11 a.m. Eastern Daylight Time yesterday for the major Shellshock vulnerability in the Bash function, your work is not done here yet. New bugs have been reported in Bash, so it's probably time to patch again, security experts warn.
Home Depot breach bigger than Target at 56 million cards
Vectra CEO Hitesh Sheth says that the recent Home Depot breach exposes a serious security weakness, noting that the company said hackers used unique, custom-built malware to compromise up to 56 million payment cards.
Why breach detection is your new must-have cyber security tool
It's time for CIOs to start focusing on the next line of defense in the war against cyber crime: an emerging area called breach detection, which focuses on identifying long-tail intrusions after they happen and mitigating their damage, partly through the use of big-data technologies. Your company’s information security may depend on it.
Getting a clear picture of a computer network’s security
Security experts say the only hope of protecting corporate networks from hackers is something the industry calls “defense in depth.” The phrase simply means that plugging in one traditional defense – antivirus software, or a firewall, is no longer going to cut it.
Vectra to use Series C to grow real-time cyber threat detection
Vectra Networks, Inc. announced on August 5 it had raised a new $25 million round of funding to boost sales and marketing for its behavior-based cyber security solution.
Cyber attacks: We're fighting an asymmetric war
Cybercriminals' ability to attack is outpacing our ability to defend. We are fighting an asymmetric war. Resources are one challenge, but so are the defensive tactics. Organizations rely on security best practices and products that were developed to counter a different threat – long before the rise of mobility, the cloud and well-organized criminals.
Video: Bloomberg TV features Vectra in a discussion about security vulnerabilities in U.S. companies
Vectra Networks CEO Hitesh Sheth and CrowdStrike CEO George Kurtz comment on the Chinese hackers that stole personal information from 4.5 million patients of Community Health Systems and discuss how vulnerable U.S. companies are to hackers. They speak with Pimm Fox on "Taking Stock."
Vectra raises $25 million to fend off cyberattacks in real time
Vectra Networks Inc., a San Jose startup whose software aims to protect corporate and government IT systems against cyberattacks, has raised $25 million in capital provided by Accel Partners, Khosla Ventures and Intel Capital.
Vectra detects cyberattacks in real-time, raises $25 million
Accel Partners and existing investors just dropped a new $25 million into Vectra Networks, a security startup deeply connected to U.S. national security officials.
Vectra raises $25 million to stop cyberattacks in progress
Cybersecurity firms now recognize that cybercriminals are so good at penetrating corporate and government IT systems that they can no longer be entirely blocked. One of these firms, Vectra Networks, has raised another $25 million in funding to detect and prioritize attacks in real time so customers can decide which ones to fight first.
Video: Bloomberg TV talks with Vectra CEO about cyber protection and privacy
Bloomberg TV host Pimm Fox speaks with Vectra CEO Hitesh Sheth on how Vectra works, its contextual reporting and protecting organizations while maintaining privacy.
Survey roundup: Culture change top compliance goal
Ben DiPietro of the Wall Street Journal looks at recent surveys and reports dealing with risk and compliance issues, including the new BYOD and Mobility Report from Vectra and the Information Security Group on LinkedIn.
Three steps to a more secure BYOD program
Despite all the warnings in the tech media about Bring-Your-Own-Device, or BYOD, security risks, a minority of organizations have implemented policies or processes to address BYOD, a new study finds.
BYOD programs leave several security holes open
Just 21 percent of more than 1,100 IT security practitioners said their organizations have fully implemented BYOD policies, processes and infrastructure, according to recent survey.
How organizations deal with BYOD and mobile security
Report shows that 21 percent of organizations who acknowledge broad use of privately owned devices do not support those devices within their organizations.
More exploits expected to enter organizations via mobile devices
The second annual BYOD and Mobile Security Study reveals more exploits entering organizations via mobile devices. All told, this reality a now a top BYOD security concern, experts reveal.
Is IT really ready for BYOD security challenges?
LinkedIn survey finds enterprise mobility still in infancy.
Vectra: 79 percent of organizations lack BYOD policies
New study shows malware protection is a requirement for mobile security.
Firms turn blind-eye to BYOD policy
Close to one-fourth of organizations that have broad use of BYOD devices do not support their use, opening up the enterprise to security risks such as malware infection.
Infosec pros worried BYOD ushers in security exploits, survey says
Despite the significant damage, including loss of company or client data and unauthorized access to data and systems that the use of privately owned devices without proper security can wreak, most organizations simply have not kept pace with the explosion in use of those personal devices in the workplace.