Forbes hottest cybersecurity startups of 2015
In 2015, there were few hotter areas in Silicon Valley than cybersecurity, and Vectra ranked in the top 10 of that competitive group.
Uncovering covert attack communications inside your network
Cyber attackers are slipping through perimeter defenses and hiding in the shadows and dark corners of networks.
Hello Kitty fixes website security flaw
Sanrio says the loophole that provided an attack entry method potentially allowing cyber criminals to bypass traditional security defences in order to enter and exploit internal systems with the appearance of a legitimate user, has been closed and data is now safe.
Algorithms are the key to detecting and mitigating cyber attacks
Gerard Bauer, vice president of EMEA sales at Vectra, shares his security predictions for 2016.
Automated threat detection helps fulfill protection goals of critical security controls
New technologies, such as machine learning, have evolved to help organizations improve their response to modern attacks. Although the financial industry has been using machine learning since the 1970s to detect fraudulent behavior, use of machine learning in the information security sector is a recent phenomenon.
Cybersecurity in virtual networks
In this eighth annual VMblog.com series exclusive, virtualization and cloud executives share their predictions for 2016.
Protecting the university network and flagging attacks — in real time
Higher education is a key target for cyber attacks because of the open networks common on college and university campuses. Thousands of students and faculty wander on and off the network with their own devices, bringing viruses and malware to the wider community and creating nightmares for security teams.
SANS Institute shows true power of automated threat detection
A SANS Institute report, backed with findings from Vectra, explains how an automated threat detection system that combines behavioral analysis, data science and machine learning can help organizations meet Critical Security Control (CSC) mandates.
The state of cybersecurity: What 2016 will bring
In 2016, what organisations need are tools that identify the activities of the attacker inside a network before a data breach occurs, with a focus on how to quickly intervene, minimise the time they are exposed and reduce the impact of cyberthreats.
How one university addresses targeted attacks in progress
Hernan Londono, associate CIO at Barry University in Miami, talks about embracing campus mobility and BYOD, and explains why a strong Advanced Persistent Threat (APT) defense is vital to protecting the university's network from mobile devices that it doesn't own or manage.
Data science, machine learning and behavioral analysis help identify new security threats
Automated network threat detection tools that use data science, machine learning and behavioral analysis work with perimeter security to help organizations meet security goals defined in the CIS Critical Security Controls recommendations and protect against attackers, according to a new report from the SANS Institute.
Fleeting strategic importance? 2016, the year of the CISO
The core view of most of the experts we spoke to was that, while it is not clear if there is a higher number of CISOs now, these individuals are definitely gaining a stronger position within the business.
Detecting and preventing cyberattacks in your network
Despite being vulnerable to cyberattacks, many universities still have insufficient threat management defenses. Attackers can easily evade perimeter security defenses and spy, spread and steal for the better part of a year, undetected. In the process, they'll take vital research data, personal info and financial records from campus community members.
Nothing's sacred: VTech hackers stole kids photos and chat histories
VTech hackers purportedly made off with millions of pieces of customer information and have now been revealed to have stolen photos and private chat histories, too. VTech sold an app called Kid Connect that lets parents use their smartphones to talk to their kids through their VTech devices.
The exploitation game
What steps can be taken to detect and block exploits that take advantage of software vulnerabilities? And how can security teams better understand the behaviour of legitimate software components? Preventing the exploitation of software vulnerabilities is desirable but their detection is a must for organisations and their security teams.
Detecting and preventing cyberattacks in your network
Officials from Vectra Networks and Barry University in Miami discuss insufficient cyber attack defenses at many colleges, despite existing vulnerabilities. They also discuss new defense-in-depth models that quickly pinpoint and mitigate threats in progress and share security strategies that enable mobility as well as open and collaborative learning.
Why ransomware is not going away any time soon
Ransomware is targeting enterprise networks with a vengeance. In addition to user hard drives, it's been increasingly successful at encrypting file-shares and network drives. Consequently, ransomware has evolved from a mere nuisance to a potentially debilitating attack that holds critical business assets and intellectual property hostage.
VTech Holdings: Data from 5 million customer accounts breached
VTech, maker of electronic toys for kids, said that 5 million of its customer accounts were leaked in a data breach that accessed user names, birthdays and passwords but not their credit card or personally identifiable information. Company officials noted that the breach was mounted by an "unauthorized party."
Vectra wins 2015 Computer Technology Review Most Valuable Product award
Vectra advanced persistent threat (APT) security software was chosen by the Computer Technology Review editorial panel based on rigorous judging criteria that included product innovation, functionality and affordability.
No signatures required
However, the most dangerous threat to data, user and system security is not the known known, but rather the unknown unknowns – the threats that have yet to be captured in the wild and mapped. We don’t know if they exist, we don’t have visibility into what they do, and there’s no way signatures can catch them.
GSN announces winners and finalists in 2015 Homeland Security Awards
Government Security News is pleased to announce that Vectra has been named a finalist in its seventh annual Homeland Security Awards for Best Threat Intelligence Solution.
The Internet of Things is making oil production vulnerable to hacking
The oil and gas industry is caught in a slump, with prices going up and down and profits in decline. But it faces another major problem that's gotten less attention: Cyber attacks could threaten industry stability and worker safety.
A look at real risks to school networks, with a level-headed security approach
Unlike vendors that attempt to make every piece of malware sound like the end of the world, it is important to show IT security teams which threats actually pose the greatest risks to the university.
Vectra helps organizations identify intruders that are already in their networks
Most security solutions have one at-bat, yet attackers can typically survive undetected in a network for around 225 days, says Vectra’s Mike Banic. “Every network has likely been hacked, but they just don’t know it yet,” he says.
Video: Top Vectra executive talks about cyber security with TMCnet editors
Vice president of marketing Mike Banic shares the company's latest developments and discusses its recent advancements in the real-time detection of in-progress cyber attacks that spread inside networks.
Branch offices are more than a remote risk to network security
While remote offices, clinics, bank branches and retail locations are critical to business success, they often lack the same security protections found at the headquarters or data center locations.
Vectra is among 16 technology innovators at SINET
The capstone event of SINET is its yearly innovation showcase in Washington, D.C., the last of which was held Nov. 3-4. The showcase brought together innovative solutions from 16 firms, including Vectra, selected by a collective of seasoned judges.
Can we protect data without prying?
Are cybersecurity and privacy mutually exclusive, or is it possible to have both? Oliver Tavakoli, CTO of Vectra Networks, offers a quick analysis of the commercial solutions available from well-known cybersecurity suppliers to provide valuable insight.
Cybersecurity students learn by hacking at RIT Collegiate Pentesting Competition
Rochester Institute of Technology is already planning its second Collegiate Pentesting Competition after the success of its first annual event held Nov. 7–8 in Rochester, N.Y. Teams from nine regional universities faced-off at RIT as they broke into computer networks, evaluated their weak points and presented plans to better secure them.
Vectra sponsors collegiate competition to battle cyber threats
A new competition at Rochester Institute of Technology allows students to attack the problem of cyber security from a different perspective. Instead of defending themselves against attackers, as other cyber threat competitions do, these students create a full-fledged plan of attack and launch it against a network.
TalkTalk reveals extent of data hack, second teen arrested
Two teens arrested after being implicated in the attack on internet service provider TalkTalk in which 1.2 million customer details were stolen last week.
Putting on the cyber shift: How to adapt to advanced strategies
Cyber attackers are moving laterally inside networks and using hidden tunnels of encrypted traffic to get around. The encrypted traffic that protects data within modern applications – such as SharePoint, Exchange, Salesforce.com, and Google Apps – creates a blind spot that can be exploited by advanced threats and malware.
Breach analytics: The next billion-dollar investment opportunity
Vectra takes the network analytics approach, proposing to weave together data via machine learning to surface anomalous behaviors and even anticipate an attacker’s next move.
TalkTalk receives ransom demand following website hack
TalkTalk Telecom Group PLC said Friday it has received a ransom demand from someone claiming responsibility for a criminal hack of its website that could have resulted in the theft of data from its database.
Expert comment: TalkTalk cyber breach
For the third time, UK telecoms provider TalkTalk has fallen victim to a cyber-breach and there could be as many as four million customers affected.
Cyber security experts react to TalkTalk breach
In the wake of news that TalkTalk have suffered their third serious data breach in a year, industry experts have lined up to express concern at the company’s blasé attitude toward cyber security.
Oil and gas industry must face the challenges of cyber safety
Cyber threats to the oil and gas industry infrastructure are potentially more serious than the breaches where hackers capitalize on stolen personal, health care or financial information. Nation states and foreign businesses have motivations to carry out cyber attacks with potentially crippling global consequences.
Vectra Networks comments on Dridex malware threat
The National Crime Agency has issued a warning that a new version of the Dridex malware is targeting the UK, with £20 million having already been purported stolen by this attack.
EC3 in cooperative action to target Dridex banking malware
EC3, NCA, FBI and a range of other bodies have targeted the Dridex banking malware, including using a sinkhole operation to sever communications between infected botnets and their controlling cyber-criminals.
Barry University gets smart about cyber security
The university turns to Vectra for a real-time cyber-attack detection system that uses data science, machine learning and behavioral analysis to detect attacks in progress.
Taking stock: Ranking the next bllion-dollar cybersecurity markets
Venky Ganesan, managing director at Menlo Ventures, writes, “I believe there will be significant winners…notably those that reduce false positives and prioritize workflows for better incident response and remediation. Among the early leaders are companies such as Exabeam, LightCyber, Securonix and Vectra Networks."
Adobe patches many flaws in Flash Player, Acrobat, Reader
Updates released on Tuesday by Adobe for Flash Player, Reader and Acrobat address a significant number of vulnerabilities that expose the users of these products to hacker attacks. The work of experts from Vectra Networks has been acknowledged in finding and reporting vulnerabilities.
Jackson Health System to present cyber attack prevention at ITxpo
Vectra customer Jackson Health System will speak at the Gartner Symposium/ITxpo 2015 event next week. Jackson Health System CISO Connie Barrera will present “Protecting Health Organizations from Cyber Attacks” on Oct. 6 at 3:50 p.m. EDT in the Europe 8 Conference Room of the Walt Disney World Dolphin hotel in Orlando, Florida.
SINET names Vectra a top cybersecurity innovator
SINET, an organization focused on advancing cybersecurity innovation through public and private sector collaboration, today announced the winners of its annual SINET 16 Innovator competition, including Vectra Networks.
Vectra raises $35 million in sizzling cyber security investment market
Vectra Networks raised $35 million in equity funding on Tuesday. DAG Ventures led the round with participation from all existing investors including Khosla Ventures, Accel Ventures, IA Ventures, AME Cloud Ventures, Intel Capital and Juniper Networks.
The unintended attack surface of the Internet of things
While consumer Wi-Fi products may seem like an odd choice for intensive threat research, Vectra Threat Labs found that vulnerabilities in consumer and Internet of Things gear can end up having a much larger impact on enterprise security than you might think.
Value-added distributor Cloud Distribution teams up with Vectra in the UK
Distributor Cloud Distribution has reached an agreement with Vectra Networks to provide the vendor’s security products to the channel. Cloud Distribution says it will help grow the Silicon Valley firm’s presence in the UK and forge relationships with new partners to drive revenue growth.
Vectra signs Cloud Distribution as a value-added distributor in the UK
Cloud Distribution has inked a deal with cybersecurity vendor Vectra Networks as the US player launches in the UK.
Barry University adopts anti-cyber attack measures
Barry University, a 9,000-student Catholic university in Miami, has signed Vectra Networks to protect its data and networks from cyber attacks.
Barry University stops cyber attack in progress with Vectra
Barry University has selected Vectra to protect its high-value data Relevant Products/Services as advanced persistent attacks (APTs) surge. Vectra’s automated threat management solution enables the university to detect cyber attacks as they are happening – automatically and in real time.