Should you use a VPN for security? Experts weight in
“Think carefully about the VPN provider you use. Many of the free VPN providers are in the business of monetizing your personal data to pay for their services," says Chris Morales, the head of security analytics at Vectra.
Vectra’s EMEA director questions AI: Hype or reality for today’s challenges?
AI is augmenting security analysts and also making a considerable contribution to bridging the cyber skills and resource gap by allowing less experienced analysts to enter the profession and achieve more, more quickly.
Artificial intelligence as a weapon for hackers
Vectra’s Cognito platform uses AI to detect cyber attacks in real-time. Combining human intelligence, data science, and machine learning, Cognito automates tasks that are normally done by security analysts and greatly reduces the work that’s required to carry out threat investigations.
Why humans remain at the core of good security operations
The use of AI in cybersecurity not only expands the scope of what a single security expert is able to monitor, but importantly, it also enables the discovery of attacks that would have otherwise been undetectable by a human.
Vectra comments on the international crackdown of IM-RATs
‘Remote Access Trojans (RATs) are an insidious set of attacker tools that invade our systems, data and privacy. With so much legitimate remote access happening across our networks and hosts, there’s plenty of opportunity for RATs to operate undiscovered as they hide in plain sight.
13 hackers behind Imminent Monitor RAT arrested in worldwide crackdown
"By analysing large numbers of RATs, a supervised machine learning model can learn how traffic from these tools differs from normal legitimate remote access traffic and so spot “RATish” behaviour without prior knowledge of the attack, or individual RAT’s code," says Matt Walmsley, EMEA Director at Vectra.
Role of AI in cybersecurity and 6 possible product options
Using some 60 machine learning models to analyze all behaviors an attacker could perform across an attack lifecycle, its Cognito platform claims to flip the traditional approach to user-based threat detection on its head by providing the defender with multiple opportunities to detect an attacker.
Government releases first Australian IoT code of practice
While the code of practice is welcome, the voluntary approach has certain limitations, particularly for an IoT industry with a supply chain with varying security resources, according to Kevin Vanhaelen, regional director, Asia-Pacific, Vectra.
As government reins in IoT security, recalcitrant mining industry is exposed
The code offers important “recognition of some of the key IoT risks and associated steps responsible IoT vendors and service providers might take,” said Kevin Vanhaelen, regional director, Asia-Pacific, Vectra in the wake of the draft code’s release.
Facebook app has been secretly accessing users' cameras while they read news feed
“This is mostly a harmless bug that allows Facebook to use the camera but it is not a compromise or breach of personal data or privacy. The easiest thing to do is for users to disable the use of the camera in the iPhone app settings,” says Chris Morales, head of security analytics at Vectra.
Channel roundup: Who’s gone where?
“As we continue to transform threat detection response for enterprises migrating to the cloud, enabling the building of next-generation security operations centers and communicating the value of transforming cybersecurity with artificial intelligence is more important than ever,” said Vectra CEO Hitesh Sheth.
Financial-services firms face "constructively tough" crackdown after breaches from "basic cyber hygiene" deficiencies: APRA
That rate of cyber breaches “indicate that there is still room for improvement,” says Kevin Vanhaelen, Asia-Pacific regional director at Vectra, “and I would bet my bottom dollar that there are more that are yet to be discovered.”
CxO of the week: Hitesh Sheth, CEO of Vectra AI
Hitesh Sheth is a man with one of the most inspiring stories in the entrepreneurial world and technology environment. Sheth grew up in Kenya, sharing a one-bedroom apartment with his family, where he slept in the laundry room.
Is the cloud safe? – Reducing business risk as enterprises aggressively move to the public cloud
In this podcast, TCV’s Tim McAdam and Vectra CEO, Hitesh Sheth, talk about what it takes to reduce business risk in the cloud – and keeping enterprises, consumers and their transactions/interactions secure – while capitalizing on the tremendous opportunities the cloud offers.
APRA's new cyber standard produces 36 breach notifications in four months
Kevin Vanhaelen, regional director, Asia-Pacific, of network security vendor Vectra AI said the reported 36 breaches is almost certainly an underrepresentation of the actual attacks and more breaches which have already occurred will come to light in the future.
Microsoft confirms BlueKeep campaign, reiterates call to patch
"RDP is a valuable mechanism for threat actors to progress their attacks and certainly has a broader utility than simple cryptojacking attempts. RDP remains a widely exposed and vulnerable attack surface and will likely continue in the near future due to the protocol’s prevalent use," Vectra EMEA director Matt Walmsley told SC Media UK.
Ask the experts: How can I help my team manage security alerts?
Security analysts must continuously hunt for attackers already inside the network. They need to be able to respond to the threats that can cause real damage immediately, and correctly since not all attacks are the same.