about - Media coverage

Google fined €50m in “one of the first high-profile tests of GDPR”

January 21, 2019

Verdict

“I’d expect Google to challenge the ruling, and we may see the conclusion produce an important test in law that will bring clarity around GDPR implementation for others,” says Matt Walmsley, EMEA director at Vectra.

Read article

Impact of U.S. government shutdown on cybersecurity

January 18, 2019

SecurityWeek

“The biggest concern about the shutdown is that it would hamper the government’s ability to attract and retain good cybersecurity talent," says Chris Morales, head of security analytics at Vectra. "Private sector cybersecurity jobs pay much more lucrative salaries and benefits, which makes it much harder for government agencies to compete."

Read article

Vectra verzeichnet deutliches Wachstum

January 17, 2019

Infopoint Security

Vectra, der führende Security Anbieter von KI-gestützter Cyberangriffserkennung und Bedrohungssuche, hat heute bekannt gegeben, dass das Unternehmen seine jährlichen wiederkehrenden Umsätze im Jahr 2018 gegenüber 2017 um 104 Prozent steigern konnte.

Read article

Shutdown a threat to IT security recruitment

January 15, 2019

Infosecurity

The biggest concern of the government shutdown is that this type of instability would hamper the federal government’s ability to attract and retain good cybersecurity talent, according to Chris Morales, head of security analytics at Vectra.

Read article

Government shutdown: Experts fear deep cybersecurity impact

January 11, 2019

GovInfoSecurity

Chris Morales, head of security analytics at Vectra, says NIST would be subject to closure because it's primarily a research and publication institute. He says it might be concerning that some individuals couldn't reach the organization's Cybersecurity Framework, but that document is still available via a direct link.

Read article

Schwerwiegende Cyberattacke in Deutschland

January 11, 2019

NT4 Admins

Der Cyberangriff auf Politiker, Journalisten und Prominente in Deutschland hat international für Aufsehen gesorgt. Gérard Bauer, Vizepräsident von EMEA bei Vectra, einer auf KI basierenden Cybersecurity-Firma, gibt Einblick in den Angriff.

Read article

Dems use fake news propaganda in Alabama campaign

January 11, 2019

Infosecurity

"Since we have been successful using AI to detect attacker behaviors in real time, someone should ask a team of data scientists to find a way to use AI to detect political misinformation, since there seems to be more than an average person can sort through,” says Chris Morales, head of security analytics at Vectra.

Read article

Vaste vol de données personnelles de figures politiques outre-Rhin

January 9, 2019

LeMagIT

Matt Walmsley, chez Vectra, penche également, à ce stade, pour la motivation politique. Et Daved Emme, de Kaspersky, estime que l’appât du gain apparaît peu probable « comme première motivation ». Pour lui, « il s’agit probablement d’un hacker activiste ».

Read article

Spectre, Meltdown vulnerabilities will haunt industry for years

January 8, 2019

Security Now

"While these are scary threats, the ability to execute an attack using these flaws is hard," says Chris Morales, head of security analytics at Vectra. "The speed to extract data from system memory is very low and stealing anything more than a simple password could take days or much longer."

Read article

Industry reactions to massive data leak in Germany

January 7, 2019

SecurityWeek

"Erosion of confidence in the government could benefit nation states wishing to promote political instability in Germany and it was interesting to see that the members of the right wing AfD party were not reportedly affected," says Matt Walmsley, EMEA director at Vectra.

Read article

Industrie 4.0: 2019 muss das Jahr der IIoT-Sicherheit werden

January 7, 2019

TechTarget

Der Bericht von Vectra kam zu dem Schluss, dass "IIoT-Geräte zusammen eine riesige, leicht zu durchdringende Angriffsfläche bieten, die es Cyber-Kriminellen ermöglicht, im Inneren zu suchen, um kritische Assets zu stehlen und die Infrastruktur zu stören."

Read article

KI und Cyber Security in 2019

January 6, 2019

Trojaner-Info

„Während viele Unternehmen bereits in Tools zur Cybersicherheit investiert haben, die grundlegende Techniken des maschinellen Lernens verwenden (wie Random Forest), wird Deep Learning im Jahr 2019 zur besten Methode für die Erkennung von Cyberangriffen werden“, sagt Gerard Bauer, Vizepräsident von EMEA bei Vectra.

Read article

Datensicherheit ? Hacker attackieren Politiker, Künstler und Journalisten

January 6, 2019

Trojaner-Info

„Dies ist nur der erste von vielen schwerwiegenden Zwischenfällen, die wir in diesem Jahr erleben werden, und es erinnert uns daran, dass gut ausgerüstete, motivierte und ausdauernde Angreifer fast immer Erfolg haben werden und in Netze eindringen werden“, sagt Gerard Bauer, Vizepräsident der EMEA bei Vectra.

Read article

Schwerwiegende Cyberattacke in Deutschland – Menschliche IT-Sicherheitsteams sind zunehmend überfordert

January 6, 2019

Manage IT

„Wir müssen akzeptieren, dass immer jemand versucht, ohne Erlaubnis in Systeme einzudringen“, sagt Gerard Bauer, Vizepräsident von EMEA bei Vectra. "Die Angreifer zu finden und auf die versteckten Aktionen mächtiger Angreifer zu reagieren, ist eine langwierige und anstrengende Aufgabe."

Read article

Stellungnahmen zur Hacker-Attacke auf deutsche Politiker

January 5, 2019

Datensicherheit

„Für ein Land, in dem die Privatsphäre so geschätzt wird und in dem einige der strengsten Datenschutzgesetze gelten, ist dies ein tödlicher Zwischenfall“, sagt Gerard Bauer, Vizepräsident der EMEA bei Vectra. "Dies gilt nicht zuletzt für die Glaubwürdigkeit der Bundesregierung und der staatlichen Institutionen, die sich scheinbar nicht wirksam schützen lässt."

Read article

Data on hundreds of German politicians published online in massive compromise

January 4, 2019

Dark Reading

"There is a history of Russian state sponsored interference and cyberattacks into western democracies, particularly those aligned with NATO," says Matt Walmsley, EMEA director at Vectra. If Russia was the attacker, it would not be surprising if threat actors like the Sofacy group (aka Fancy Bear/APT28) were involved.

Read article

Groß angelegter Hacker-Angriff auf Politiker, Künstler und Journalisten

January 4, 2019

Infopoint Security

„In zunehmendem Maße übernimmt die Automatisierung mit künstlicher Intelligenz die schwierige Herausforderung, um mit einer Geschwindigkeit Angriffe zu erkennen, die menschliche Sicherheitsteams allein nicht erreichen können,” sagt Gerard Bauer, Vizepräsident von EMEA bei Vectra.

Read article

Wide-ranging German doxxing incident hits hundreds of politicians

January 4, 2019

Threatpost

“Initial reports say that members of the far-right Alternative for Germany (AfD) party hasn’t been affected so there may be a political motivation in this attack,” says Matt Walmsley, EMEA director at Vectra. “We shouldn’t disregard the work of foreign state actors here either."

Read article

German politicians, journalists hit by massive data breach

January 4, 2019

SC Media

"This is just the first of many high-profile breaches we’ll see this year and it serves a powerful reminder that well-resourced, motivated and persistent attackers almost always succeed," says Matt Walmsley, EMEA director at Vectra.

Read article

German politicians’ data leak shows need for global action

January 4, 2019

Computer Weekly

Matt Walmsley, EMEA director at Vectra, notes that Germany’s BSI information security agency was tipped off by the US last month that China was targeting the country with cloud hopper-style attacks that target organisations through managed service providers.

Read article

Mass hack of German politicians 'very damaging' to government credibility

January 4, 2019

Verdict

“For a country that holds individual privacy so dearly and has some of the region’s strictest data protection laws this is a very damaging attack, not least for the German government’s credibility to secure itself,” comments Matt Walmsley, EMEA director at Vectra.

Read article

Report shows Equifax could have prevented 2017 breach

January 2, 2019

TechDecisions

“It is a classic ‘could have, should have’ scenario,” says Chris Morales, head of security analytics at Vectra. “The failure comes down to people and process, not necessarily technology. As long as a motive exists, attackers will attempt to compromise networks until they succeed.”

Read article

Cybersecurity firms and threat actors alike will grow their use of AI

January 2, 2019

ITPro Today

“Data science platforms that support machine learning will become the mainstay of cyber security systems,” says Chris Morales, head of security analytics at Vectra. Security vendors are leveraging AI software to churn through massive amounts of data to detect and defend against cyberthreats.

Read article

AAA Cercasi cyber-esperti

January 2, 2019

Il Blog di Beppe Grillo

“Se non ci sono abbastanza persone, questo significa che la domanda è altissima, e continua ad aumentare”, dice Hitesh Sheth, CEO di Vectra. “Così chi ha le capacità necessarie se ne va dopo 12 mesi perché trova qualche altra azienda disposta a dargli un 30% in più di aumento”.

Read article

AI und Cyber Security im kommenden Jahr

December 27, 2018

IT Daily

"Geopolitische Spannungen und Handelskriege werden das Wachstum der kommerziellen Cyberspionage vorantreiben," sagt Gerard Bauer, Vizepräsident der EMEA-Region von Vectra. "Diese Angriffe werden von vielen Opferunternehmen nicht erkannt, da sie keine versteckten Bedrohungen in Netzwerken erkennen können."

Read article

Back to the future for 2019

December 27, 2018

ITProPortal

"We will see an increase in the use of deep learning, such as recursive neural nets, that enable algorithms to continuously learn and evolve," says Chris Morales, head of security analytics at Vectra. "2019 will see deep learning become the best practice for detecting cyberattacks."

Read article

Security holes at U.S. missile defense systems data centers shocks experts

December 21, 2018

Data Center Knowledge

The problem wasn't that the data centers lacked the authentication or encryption tools. "The controls existed but were not implemented and used equally and regularly," Chris Morales, head of security analytics at Vectra, says.

Read article

Emotet-Malware: Hohe Schäden in Unternehmensnetzen

December 21, 2018

Netzwerker News

Für Gérard Bauer, Vizepräsident von EMEA bei Vectra, zeigt der Erfolg alter Malware eines der grundlegenden Probleme vieler IT-Sicherheitslösungen, die immer noch auf klassischen Cybersecurity-Konzepten beruhen.

Read article

Smartphones and the new cybersecurity threat

December 21, 2018

MHI Solutions

Chris Morales, head of security analytics at Vectra, says the biggest risk posed by mobile devices in a corporate network is malicious apps gaining access to enterprise data. Make sure mobile devices do not share network connectivity with critical infrastructure or systems with sensitive information.

Read article

Best security software: How 25 cutting-edge tools tackle today's threats

December 21, 2018

CSO

The Vectra Cognito platform incorporates artificial intelligence (AI), deep machine learning and traffic monitoring into a tool that is able to detect threats that other programs miss, even if they are already entrenched inside a protected network.

Read article

Alphabet's VirusTotal: A security solution for your small business?

December 18, 2018

Business News Daily

"VirusTotal provides value only if you have the necessary staff to extract value from it," says Oliver Tavakoli, chief technology officer at Vectra. "This is reflective of the fact that the VirusTotal data repository is of most value to large and expert IT security teams."

Read article

Cyberattacke auf Marriott-Hotelkette politisch motiviert?

December 17, 2018

IT Business

"Dieser Cyberangriff ist eine Form der Spionage von Nationalstaaten", sagt Gerard Bauer, Vizepräsident von EMEA bei Vectra. "Der einzige Unterschied ist jetzt, dass es im Cyberspace passiert, anstatt in ein Gebäude einzubrechen und physische Dokumente zu stehlen."

Read article

As manufacturing moves into cyberspace, so do security threats

December 13, 2018

Manufacturing.net

Vectra’s artificial intelligence-based platforms detected “a higher-than-normal rate of malicious internal reconnaissance behaviors” from attackers inside of manufacturers’ systems and that this “indicates that attackers are mapping-out manufacturing networks in search of critical assets to steal or damage.”

Read article

China suspected of massive Marriott data breach

December 13, 2018

Security Now

"Hacks are getting bigger because the volume of data generated on the Internet every single day is so large," says Chris Morales, head of security analytics at Vectra. "Just like a user employs a search engine to get information, a cyber spy will search massive online databases for information."

Read article

Clemson's cautionary cryptomining tale

December 11, 2018

HPCwire

“Cryptomining efforts are popular across higher education," according to a study published in March from Vectra. Vectra reported that 85% of cryptocurrency mining instances happened in higher education between August 2017 and January 2018, compared to just three percent in the technology sector.

Read article

Former Equifax CEO blamed for 'entirely preventable' data breach

December 11, 2018

IT Pro

"Prevention will never be 100%," says Chris Morales, head of security analytics at Vectra. "That is unrealistic. The report states the breach was entirely preventable. I don't believe that is true. It is the same notion as building a wall would stop the drug trade. The criminal build tunnels instead."

Read article

Damning report on Equifax security failures is a lesson for all enterprises

December 11, 2018

Computer Business Review

"We can improve our ability to detect and respond to breaches by looking for the type of behaviors an attacker performs," says Chris Morales, head of security analytics at Vectra. "The most critical threat behaviors should be correlated with compromised hosts in real time before they become a problem."

Read article

Equifax breach was ‘entirely preventable,’ congressional report says

December 10, 2018

MarketWatch

“It is a classic ‘could have, should have’ scenario,” says Chris Morales, head of security analytics at Vectra. “As long as a motive exists, attackers will continuously attempt to compromise networks until they succeed. The failure comes down to people and process, not necessarily technology."

Read article

Emotet-Malware verursacht schwere Schäden in Unternehmensnetzwerken

December 7, 2018

IT Daily

Für Gérard Bauer, Vizepräsident von EMEA bei Vectra, zeigt der Erfolg der "alten" Emotet-Malware eines der grundlegenden Probleme vieler IT-Sicherheitslösungen, die immer noch auf klassischen Cyber-Sicherheitskonzepten basieren.

Read article

The next big risk to your security is your child’s video-game habit

December 6, 2018

MarketWatch

“Gaming has always been an arena for hacking and attacks,” says Chris Morales, head of security analytics at Vectra. “In today's competitive and financially lucrative gaming world, that means bypassing developer controls to gain a competitive advantage or disrupt other players.”

Read article

UK spy agency joins NSA in sharing zero-day disclosure process

December 6, 2018

SecurityWeek

"Zero days are saved for the most critical needs," says Chris Morales, head of security analytics at Vectra. Most attackers don’t like to waste this type of knowledge when they can simply convince a user to give them access to their system instead."

Read article

30 years ago, the Morris worm changed our view of cybersecurity

December 5, 2018

Verdict

“Enterprises are unable to spot worm reconnaissance and lateral movement behaviors," says Matt Walmsley, EMEA director at Vectra. "Security analysts can't operate at the speed and scale required to manually identify the threat and close down their lines of communication and movement."

Read article

AI companies race to get upper hand in cybersecurity before hackers do

December 3, 2018

Investor's Business Daily

To detect cyberthreats, their AI software sifts through massive stores of computer network data. Wall Street analysts are eyeballing and a handful of other private firms. With AI tools, the new AI companies are taking customers away from cybersecurity industry incumbents, analysts say.

Read article

Marriott: Quelles conséquences de la violation de données de 500 millions de clients?

December 3, 2018

Informatique News

"La réponse aux incidents prend trop de temps et, dans de nombreux cas, les équipes de sécurité tentent de comprendre ce qui s'est passé et comment l'empêcher de se reproduire plutôt que de détecter et d'intervenir tôt dans le cycle de l'attaque pour éviter le vol et les dommages," a déclaré Gregory Cardiet. un expert en cybersécurité chez Vectra.

Read article

Violation massive de données des clients Starwood

December 3, 2018

Solutions Numerique

"Les attaquants avancent lentement et par étapes pour obtenir des privilèges et adopter une variété de comportements avant d’accéder aux données souhaitées, de les exfiltrer," explique Gregory Cardiet, expert en cybersécurité chez Vectra. "La détection de ces comportements à un stade précoce est essentielle."

Read article

500 millions de clients des hôtels Marriott piratés

December 3, 2018

Lemonde Informatique

"Si les dates sont vraies, entre la date de détection initiale ou le 8 septembre 2018 et la divulgation publique de la faute, l'exigence de notification GDPR de 72 heures était très loin d'être respectée," déclare Gregory Cardiet, expert en cybersécurité chez Vectra.

Read article

Marriott reconnaît une brèche affectant 500 millions de clients

December 3, 2018

LeMagIT

"Disposer de systèmes qui surveillent le comportement d'exfiltration plutôt que d'essayer d'inspecter les charges utiles de données peut être un moyen de relever ce défi," déclare Gregory Cardiet de Vectra. "La détection de ces comportements à un stade précoce est essentielle."

Read article

500 Millionen Datensätze bei Marriott ausgecheckt

December 3, 2018

Manage IT

"Was die Datenschutzverletzung selbst anbelangt, war die Exfiltration der Daten innerhalb der Verschlüsselung möglicherweise ein Versuch, Sicherheitskontrollen wie Systeme zum Schutz vor Datenverlust zu umgehen", sagt Gerard Bauer, Vizepräsident der EMEA.

Read article

Marriott Starwood data breach details: What was taken?

November 30, 2018

SecureWorld

Incident response continues to take too long as security teams try to figure out what happened and how do we stop it happening again, says Chris Morales, head of security analytics at Vectra. "It's important to spot and close down an attacker earlier in its lifecycle to minimize or stop a breach from occurring."

Read article

Marriott: 500 million guest records compromised in data breach

November 30, 2018

Security Now

"Data exfiltration inside encryption can circumvent security controls like data loss prevent," Morales says Chris Morales, head of security analytics at Vectra. "Systems that watch for exfiltration behaviors, rather than trying to inspect the data payloads, can provide a way to handle this challenge."

Read article

Marriott Starwood reservation system data breach exposes 500 million customer records

November 30, 2018

SC Media

Although Marriott reported the malware resided in its U.S.-based reservation system, if any EU guests were involved it could open the company up to fines due to GDPR, said Chris Morales, head of security Analytics at Vectra.

Read article

Industry reactions to the enormous Marriott data breach

November 30, 2018

Help Net Security

"With a real treasure trove of valuable personal information having been lifted, this is undoubtedly going to damage the Marriott Starwood brands, and could have a significant direct impact for their affected customers identity assurance," says Matt Walmsley, EMEA director at Vectra.

Read article

Marriott hack reaction: “It’s likely that every living human has been hacked”

November 30, 2018

Verdict

“With a real treasure trove of valuable personal information having been lifted, this is undoubtedly going to damage the Marriot Starwood brands, and could have a significant direct impact for their affected customers identity assurance,” says Matt Walmsley, EMEA director at Vectra.

Read article

DOJ takes down online ad fraud ring, indicts 8

November 29, 2018

E-Commerce Times

Among the victims of ad fraud are companies that have to pay for every user who views their ads. "Every company has a budget for online ads, and this type of scheme would cannibalize that budget with no return on leads or sales," says Chris Morales, head of security analytics at Vectra.

Read article

Industry reactions to USPS exposing user data

November 28, 2018

SecurityWeek

"Misconfiguration of systems is as big of a risk as system vulnerabilities," says Chris Morales, head of security analytics at Vectra. "APIs for external service integration is important to offer services to customers, but poor security practices in API access and design puts enterprises in danger."

Read article

IA et cybersécurité: Info ou intox?

November 26, 2018

ZDNet

Vectra se démarque de Darktrace en proposant des modèles mathématiques de détection développés et testés sur un groupe de sociétés utilisant la solution, testés et calibrés avant d'être déployés en production pour l'ensemble du client de base.

Read article

Cyber tzar in cabinet called for to give CNI a policy lead

November 19, 2018

SC Media

"The cybersecurity skills gap is alive and well, it’s challenging to hire and retrain cybersecurity talent," says Matt Walmsley, EMEA director at Vectra. "Within the next three years there will be in excess of 350,000 unfilled European cyber-security jobs than candidates."

Read article

Threat actors are exploiting IT networks to attack energy, utilities

November 15, 2018

ITPro Today

The findings in the Vectra 2018 Spotlight Report on Energy and Utilities “underscore the importance of detecting hidden threat behaviors inside enterprise IT networks before cyberattackers have a chance to spy, spread and steal,” says Chris Morales, Vectra head of security analytics.

Read article

Three AI-infused security solution providers named IDC innovators

November 15, 2018

IDC

Vectra leverages its automated and self-learning algorithms to provide real-time detection and response capabilities. It can also score every detection and host in terms of the threat severity and enrich threat investigation and threat hunting scenarios.

Read article

Google shows off new Android dev tools

November 14, 2018

TechNewsWorld

Smaller yet expanding devices may be more appealing to hackers than to consumers, warned Mike Banic, vice president of marketing at Vectra. The number of mobile vulnerabilities is highest on Android apps, largely due to its open source nature and the questionable security of third-party app stores.

Read article

Biometrics and AI firm team up for first U.S. biometric database amidst criticism

November 13, 2018

SC Media

"Our best course of action is to work with the national governments to ensure any biometric system is highly secure and has auditing and oversight to ensure the proper use of the biometric data,” says Chris Morales, head of security analytics at Vectra.

Read article

Autonomous apps and infrastructure: Who is in control?

November 12, 2018

TechCentral

"Organizations are moving towards more automation for very rational reasons," says Matt Walmsley, EMEA director at Vectra. "We need to understand how new AI tools work. This is new technology and we need to understand the fundamentals so we can understand how they work."

Read article

Cyberattacks in the utilities sector are thriving inside IT networks

November 12, 2018

Enterprise Management 360

“When attackers move laterally inside a network, it exposes a larger attack surface that increases the risk of data acquisition and exfiltration,” says Branndon Kelley, CIO of American Municipal Power.

Read article

NIS directive gets real after OES deadline

November 12, 2018

Infosecurity

“Nation-state actors are well-resourced, innovative and highly motivated, and organizations have limited time, finite human and technical resources and capabilities with which to protect their rapidly expanding attack surface," says Matt Walmsley, director of EMEA at Vectra.

Read article

Energy infrastructure at risk

November 9, 2018

Global Association of Risk Professionals

“Manually monitoring the network creates a challenge for resource-constrained organizations that cannot hire large security teams,” says Chris Morales, head of security analytics at Vectra. “Numerous security analysts are needed to perform the manual analysis required in identifying attacks."

Read article

Hackers are increasingly targeting energy companies – here’s how

November 9, 2018

Power Technology

When looking specifically at the enterprise networks of energy and utility companies, Vectra detected 194 command-and-control attack behaviours against energy and utility companies for every 10,000 host devices – 25 more attack behaviours than the average across all industries.

Read article

Pentagon draws back the veil on APT malware with sudden embrace of VirusTotal

November 8, 2018

Threatpost

“Rest assured that they won’t be submitting their own offensive samples," says Vectra CTO Oliver Tavakoli. "And they won’t be submitting bespoke samples that were crafted to target them except for well after the fact so as not to tip their hand to the attacker."

Read article

Saint Gobain confie sa détection d'incident à IA

November 8, 2018

CIO

Tirant les leçons de l'attaque NotPetya, Saint-Gobain a revu son plan de cyberdéfense. Sur la partie détection, le SOC peut maintenant compter sur l'IA de Vectra pour affiner les remontées d'alertes. Un changement pas uniquement technologique.

Read article

National Labs bring emerging tech to bear on grid security

November 7, 2018

Federal Computer Week

Critical infrastructure Supervisory Control and Data Acquisition systems are a perennial target for hackers. According to a study released by threat monitoring firm Vectra on Nov. 1, there were almost 200 network hacking attempts for every 10,000 SCADA host devices.

Read article

Utility and energy firms highly exposed to cyberattacks

November 7, 2018

International Finance

Usually, such attacks are meticulously planned months in advance and under-protected networks are allowing criminals to cross the threshold of infrastructure networks, according to a new research report from Vectra.

Read article

Cybersecurity, blockchain and the industrial internet of things

November 6, 2018

Forbes

The recent 2018 Spotlight Report on Manufacturing from Vectra suggested that the manufacturing industry suffers an inordinate volume of malicious internal network activity, lateral movement and reconnaissance activity; Deloitte also touched on these vulnerabilities in a recent article.

Read article

Vectra selected as a 2018 Red Herring Top 100 Global

November 5, 2018

AIthority

"We believe Vectra embodies the vision, drive and innovation that define a successful entrepreneurial venture. Vectra should be proud of its accomplishment,” says Alex Vieux, Red Herring publisher and CEO. Red Herring’s Top 100 Global list has become a mark of distinction for identifying promising companies and entrepreneurs.

Read article

Energy sector's IT networks in the bulls-eye

November 5, 2018

Dark Reading

Recent attack activity tracked by security threat monitoring firm Vectra of more than 4 million devices and systems shows that the IT networks in energy and utilities are being hit regularly by attackers intent on blending in as they conduct deep reconnaissance on their ultimate targets: The industrial networks.

Read article

Addressing the 3-million-person cybersecurity workforce gap

November 5, 2018

SecurityWeek

"AI augments the human capabilities to work at the scale and speed that manual approaches simply can't touch," says Chris Morales, head of security analytics at Vectra. "This would invaluable, given that a lack of time is one of the top job concerns being cited from IT and security professionals."

Read article

Il y a 30 ans, Morris fut le premier ver informatique de l’histoire

November 5, 2018

MtoM Mag

30 ans après, Grégory Cardiet, expert IA chez Vectra, propose son éclairage sur ce type de méthode toujours d’actualité et sur la réponse enfin apportée par l’intelligence artificielle face à ce type de menace historique.

Read article

Cybersécurité: le premier ver informatique fête ses 30 ans

November 5, 2018

Le Big Data

Heureusement, selon Grégory Cardiet, expert IA chez Vectra, l’intelligence artificielle pourrait enfin permettre aux entreprises de lutter efficacement contre ce fléau. En effet, grâce à l’automatisation, il est désormais possible de surveiller et de détecter en temps réels les vers informatiques.

Read article

Morris: retour sur le premier ver informatique

November 5, 2018

Informatique

Pour Grégory Cardiet, expert IA chez Vectra, « Les vers informatiques font partis du paysage des menaces informatiques depuis 30 ans. Nous ne sommes pas face à un phénomène nouveau, mais leur capacité à se propager comme une traînée de poudre ouvre toujours des perspectives très alléchantes pour les cyberattaquants.

Read article

Vectra Report beleuchtet Netzwerkschwachstellen bei Energieversorger

November 5, 2018

Infopoint Security

Vectra meldet, dass die meisten Cyberangriffe gegen Energie- und Versorgungsunternehmen in Unternehmens-IT-Netzwerken auftreten. Sie finden somit nicht in der eigentlich kritischen Infrastruktur statt, obwohl Cyberangreifer industrielle Steuerungssysteme ins Visier nehmen.

Read article

Cybercriminals are targeting energy firms’ enterprise networks

November 5, 2018

New Statesman Tech

In a new report, researchers at security vendor Vectra outline how hackers infiltrate energy and utilities systems and then move laterally across networks over a period of several months to gather intelligence and plan their attack.

Read article

Hackers attack energy companies' IT systems rather than ICS, says report

November 5, 2018

SC Media

The Vectra 2018 Spotlight Report on Energy and Utilities said that while ICS is in the crosshairs, most attacks against the energy and utilities industry occur and succeed inside the enterprise IT network – not in the critical infrastructure.

Read article

Cyber attacks against energy and utilities firms occur in enterprise not critical infrastructure

November 5, 2018

IT Pro

The majority of cyber attacks on energy and utility firms do not occur in the critical infrastructure of the firm, but inside the IT networks. According to a report by Vectra, such attacks are planned and orchestrated often months in advance rather than by launching an off-the-cuff attack.

Read article

Versteckte Tunnel: Per KI Licht ins Dunkel bringen

November 5, 2018

IT Finanzmagazin

Bei Finanzdienstleistern bestehen gravierende Sicherheitslücken: Cyber-Angreifer nutzen verborgene Tunnel, um auf geheime Daten zuzugreifen und Daten zu stehlen. In einer kürzlich durchgeführten Studie hat Vectra 13 andere Branchen zum Vergleich analysiert. Es wird deutlich, dass künstliche Intelligenz dazu beitragen kann, diese Sicherheitsanfälligkeit effektiv zu schließen.

Read article

Cyberattacks against energy and utilities industry increasing inside enterprise IT networks

November 2, 2018

AIthority

Key findings underscore the importance of detecting hidden threat behaviors inside enterprise IT networks before cyberattackers have a chance to spy, spread and steal. These threat behaviors reveal that carefully orchestrated attack campaigns occur over many months.

Read article

30 years ago the Morris Worm changed our view of cybersecurity. What’s changed since?

November 2, 2018

Verdict

"Enterprises are unable to spot reconnaissance and lateral movement attack behaviors, and security analysts and threat hunters cannot operate at the speed and scale to manually identify threats and close down their lines of communication and movement," says Matt Walmsley, Vectra EMEA director.

Read article

Cyberattacks against energy and utilities firms begin inside enterprise IT networks

November 1, 2018

TechRadar

“The covert abuse of administrative credentials provides attackers with unconstrained access to critical infrastructure systems and data," says David Monahan, managing research director of Enterprise Management Associates. "This is one of the most crucial risk areas in the cyberattack lifecycle.”

Read article

Four years in Europe: Lessons in cybersecurity

November 1, 2018

Security Magazine

"What is abundantly clear is that the sudden rise in demand for talent against a backdrop of relatively flat supply has created a hiring bottleneck in the path to establish a stronger security posture," writes Oliver Tavakoli, chief technology officer at Vectra.

Read article

Hackers are increasingly targeting energy companies – here’s how

November 1, 2018

Verdict

“When attackers move laterally inside a network, it exposes a larger attack surface that increases the risk of data acquisition and exfiltration,” said Branndon Kelley, CIO of American Municipal Power, an electric-power generator utility that serves municipalities in nine states.

Read article

Cyberattacks against energy sector are higher than average

November 1, 2018

SecurityWeek

"It's very easy for an attacker to get into an energy utility network, use the tools that are already there, such as Outlook web access, and then hide within the signal of things that are already happening," says Chris Morales, head of security analytics at Vectra.

Read article

Energy, utilities attacks inside IT networks rise

November 1, 2018

Infosecurity

According to a new report published by Vectra, there is a key distinction between attacks that probe IT networks for information about critical infrastructure and those attacks that actually target industrial control systems (ICSs).

Read article

Utilities, energy sector attacked mainly via IT, not ICS

November 1, 2018

Threatpost

“There is a difference between attacks that probe IT networks for information about critical infrastructure versus attacks against the ICS on which the critical infrastructure operates,” according to the new report from Vectra.

Read article

Cyberattacks on energy and utility companies increase

November 1, 2018

BetaNews

AI-powered attack detection specialist Vectra finds that attackers typically gain a foothold in energy and utilities networks by staging malware and spear-phishing to steal administrative credentials.

Read article

Cyber ‘intrusion campaigns’ increasingly target utilities

November 1, 2018

Route Fifty

“I don’t think [utilities] have watched enough for this,” Chris Morales, head of security analytics at Vectra, told Route Fifty. “They need to monitor actual IT networks a lot closer.”

Read article

More attention needs to be paid to IT networks in critical infrastructure

November 1, 2018

Politico

While attacks on industrial control systems take the spotlight, IT networks are more frequently attacked because they usually have schematics and data of those control systems, says Chris Morales, head of security analytics at Vectra.

Read article

Cyberattacks increasingly targeting enterprise IT networks in energy and utilities industry

November 1, 2018

TechRepublic

Cyberattacks targeting energy and utilities firms have increased inside enterprise IT networks, rather than the critical infrastructure, according to Vectra's 2018 Spotlight Report on Energy and Utilities.

Read article

30-jähriges Jubiläum des Morris-Wurms - Nehmen wir die Cyber Security ernst?

October 31, 2018

IT Daily

„Eine KI-basierte Automatisierung ist erforderlich, um solche Angreifer schnell zu demaskieren, sagt Gerard Bauer, Vectra-Vizepräsident von EMEA. "Dies ermöglicht es, Angriffsverhalten in Echtzeit zu überwachen und zu erkennen."

Read article

Saint Gobain confie sa détection d'incident à une IA

October 31, 2018

CIO

"Vectra donne une vue des adresses IP ayant des comportements déviants selon les scénarios threat établis par Vectra," dit Paul Le Mesle, responsable du cyber SOC de Saint-Gobain.

Read article

NotPetya : Saint-Gobain tire la leçon et s'arme d'intelligence artificielle

October 31, 2018

Industrie and Technologies

"Vectra offre un avantage considérable par rapport à un SIEM," a reconnu Paul Le Mesle, responsable du SOC Saint-Gobain. "notre CyberSOC doit intégrer les outils du Big Data, de l’intelligence artificielle et de l’orchestration, pour libérer du temps à nos analystes."

Read article

Bolton NHS Foundation Trust selects Vectra to automate threat detection

October 31, 2018

Health Tech News

“Cognito filled a gap," says Brett Walmsley, CTO at Bolton NHS Foundation Trust. "We needed to know what we didn’t know, and Cognito showed us what was hidden. With Cognito, we don’t have to worry about not knowing an attacker is in our network.”

Read article

NHS Trust selects new AI-powered cyberattack detection platform

October 25, 2018

Digital Health Age

The highest-risk threats are automatically prioritised and triaged by the Vectra Cognito platform, enabling the cybersecurity team to stop advancing threats before key assets are damaged or stolen.

Read article

Securing middle America: Small towns more at risk of ransomware and phishing

October 19, 2018

SC Media

“Local governments generally don’t have the funding required to maintain a large security staff and large set of security tools,” Chris Morales, head of security analytics at Vectra said. “More often, at best, local governments are leveraging an outsourcing security provider to perform security monitoring .”

Read article

Cybersecurity job gap grows to 3 million

October 18, 2018

SC Media

“The Equifax Cyber Threat Center last year captured 2.5 billion logs a day and monitored 50,000 security events per second," says Mike Banic, vice president at Vectra. "No matter how many security professionals you hire, humans aren’t good are drudging through mountains of manual work, yet our industry keeps asking them to."

Read article

A cyber-skills shortage means students are being recruited to fight off hackers

October 18, 2018

MIT Technology Review

“No matter how much revenue you have, you can’t find the people,” says Hitesh Sheth, CEO of Vectra, which makes the AI software the Texas A&M University System uses. “People leave in 12 months because someone else will give them a 30% bump in pay.”

Read article

Industry experts weigh in on UK’s new IoT guidelines

October 18, 2018

The Daily Swig

“The vast majority of IoT devices, particularly those aimed at consumer use, will have vendors and supporting supply chains that simply don’t have the resources, skills, or even the will to meet the framework’s recommendations,” says Matt Walmsley, EMEA director at AI security firm Vectra.

Read article

Vectra earns accolade from Frost & Sullivan for its AI-powered Cognito cybersecurity platform

October 17, 2018

Frost & Sullivan

"Vectra stands out for its ability to offer unparalleled flexibility and agility to identify fundamental attack behaviors such as command-and-control communications, abuse of account credentials, data exfiltration, botnet monetization, and early indicators of ransomware activity," said Vikrant Gandhi, industry director at Frost & Sullivan.

Read article

UK government code of practice for IoT

October 16, 2018

Information Security Buzz

"Not having the technical understanding to manage the security of these devices, consumers unknowingly put their households at risk," says Matt Walmsley, Vectra EMEA director. Consumers should change their IoT devices’ default passwords to a strong password string, and always ensure the latest firmware is running.”

Read article

UK launches 'world's first' IoT code of practice

October 16, 2018

Infosecurity Magazine

“In reality, the vast majority of IoT devices, particularly those aimed at consumer use, will have vendors and supporting supply chains that simply don’t have the resources, skills, or even the will to meet the frame work’s recommendations,” says Matt Walmsley, EMEA director at Vectra.

Read article

UK government launches IoT code of practice: Industry experts react

October 16, 2018

Verdict

Matt Walmsley, EMEA director at Vectra, says that while the Code of Practice recognizes key IoT risks, there are problems surrounding it. “Voluntary codes of practices will likely only attract organizations who are already proactive and bought into addressing the issues the Code of Practice seeks to address,” he says.

Read article

Die it-sa 2018 in Bildern

October 15, 2018

Industry of Things

Vectra setzt dort an, wo viele Security-Lösungen wie Virenscanner oder Firewall bereits versagt haben. Die Lösung ist in der Lage, Auffälligkeiten im Netzwerk zu erkennen und dann Alarm zu schlagen. Gartner stuft Vectra Networks damit als „visionär“ im Bereich Intrusion Detection and Prevention Systems ein. Auf der ITSA stand das Unternehmen mit den Themen ML und KI im Mittelpunkt.

Read article

Costly cryptojacking overtakes ransomware in the enterprise threat stakes

October 11, 2018

SC Media

Chris Morales, head of security analytics at Vectra, warns that the enterprise must tighten up software supply chain assurance and balance the risks and rewards of internet access and browser controls. "Organizations need to balance that against constraining legitimate organizational digital activities," he says.

Read article

Startup firms at the age of growing cybercrimes

October 10, 2018

Hacker Combat Community

"Startups that are just features and aren’t acquired may not have a chair when the music stops playing," says Vectra CEO Hitesh Sheth. "If you do the due diligence and pay attention, you can find some real gems that you want to return to."

Read article

Multi-pronged approach to tackle cyberskills gap

October 10, 2018

TechCentral

“Over time, enterprise has built technologies and bolted them on, and there is a way that you can remove the layers with AI, because it is a big data analysis — taking what all of these various components are doing as part of the evolution and really bringing it back into one product,” says Matt Walmsley, EMEA director at Vectra.

Read article

IA peut créer de plus de valeur pour les RSSI et leurs organisations

October 9, 2018

Global Security Mag

“Les logiciels malveillants opportunistes tels que les ransomwares et les cryptominers sont désormais des menaces courantes, et les attaques avancées ciblées restent les plus dangereuses et les plus difficiles à gérer et à atténuer pour les entreprises,” dit Gregory Cardiet de Vectra.

Read article

Seven best practices for working with cybersecurity startups

October 9, 2018

CSO

An acquisition by a larger company can be both a good and a bad thing for a startup and its customers. "Startups that are just features and aren’t acquired may not have a chair when the music stops playing — and may have to shut their doors," says Hitesh Sheth, CEO at Vectra.

Read article

Cybersicherheit entwickelt sich zum Wettrennen

October 8, 2018

IT Daily

„Oberflächlich betrachtet, mag diese Malware extrem erscheinen, aber sie ist an sich lediglich eine Kombination aus bestehenden Methoden von Cyberangreifern,” sagt Gerard Bauer, Vice President EMEA bei Vectra. „Sie umfasst den gesamten Lebenszyklus eines Angriffs – von der Infektion bis zur Datenvernichtung.”

Read article

Tools for managing cyberthreats to manufacturing

October 8, 2018

Advanced Manufacturing

"The manufacturing industry exhibits higher than normal rates of cyberattack reconnaissance and lateral movement activity," says Chris Morales, head of security analytics at Vectra. "This is due to the rapid convergence of enterprise IT and operational technology (OT) networks, combined with the lack of security for IIoT devices."

Read article

Russian hackers targeted Cancer Research UK and other British businesses

October 8, 2018

The Telegraph

Magecart, an anonymous Russian group of cyber criminals, tried to steal the card details of people in the UK who had brought items through the cancer charity’s online gift shop. Matt Walmsley, EMEA director at Vectra, warned that charities are an “irresistible target” to hackers because they process large numbers of online payments.

Read article

Teach your AI well: A potential new bottleneck for cybersecurity

October 8, 2018

Dark Reading

"Machine learning allows us as defenders to adapt much more quickly in real-time to threats that are constantly changing," says Chris Morales, head of security analytics at Vectra. "What machine learning is good at doing is learning over time and adapting. As environments change, the machine can start to change."

Read article

L’intelligence artificielle au secours de la cybersécurité

October 5, 2018

Silicon

«Ce que l’IA sait bien faire, c’est lire des paquets réseaux à grande vitesse et les comparer à des modèles de comportement, complète Grégory Cardiet, ingénieur avant-vente de Vectra. Est-ce que cette machine a un comportement d’attaque ? Certains malwares sont inconnus au bataillon. Ils n’ont été créés que pour ce client, le vol d’information est silencieux.»

Read article

Cold boot attack method leaves laptops vulnerable

October 4, 2018

ITProToday

“A proper response should include the revocation of credentials and user access from that system," says Chris Morales, head of security analytics at Vectra. "This works if the proper response policy is in place and users know to respond quickly to IT before potential access and compromise occurs.”

Read article

Pumping the brakes on artificial intelligence

October 3, 2018

Threatpost

“AI is pretty complex, built around processing large amounts of data and learning from it,” explains Vectra CTO Oliver Tavakoli. “There are hundreds of thousands of lines of code behind AI interfaces and entities – and some are even neural networks that are not totally understandable by the people that created them."

Read article

Cisco Talos spotted 18 vulnerabilities in Foxit PDF Reader, eight in Atlantis World Processor

October 2, 2018

SC Media

"We will see more attack vectors that exploit software users," says Chris Morales, head of security analytics at Vectra. "We must assume vulnerabilities exist and will be exploited” He recommends focusing more on detecting threats in real time and responding rapidly to reduce the impact of vulnerabilities.

Read article

Facebook's data breach: Will it be the first test of GDPR?

October 2, 2018

Security Now

"A lot of content that users post on Facebook is shared publicly and cannot be classified as private information," says Chris Morales, head of security analytics at Vectra. "This data breach is different than leaking your personal credit card, health information, or even your personal browsing history."

Read article

Dogcall RAT links NOKKI malware with Reaper Group – indicators provided

October 2, 2018

SC Media

"The analysis and identification of signatures for the initial infection is always behind the threat becoming known and out in the wild," says Matt Walmsley, EMEA director at Vectra. "It’s not enough to build stronger defenses. Motivated and well-resourced attackers will always find a way given enough time and persistence."

Read article

Industry experts comment on Facebook security breach

October 1, 2018

Intelligent CISO

“There aren’t many details on this as of yet, but what we do know is that the attackers manipulated a flaw in the ‘view as’ feature of Facebook to acquire user access tokens that would allow a person to log into user accounts," says Chris Morales, head of security analytics at Vectra.

Read article

Podcast: An all-out AI war is imminent in 2018

December 29, 2017

Bloomberg

Vectra CEO Hitesh Sheth talks with Bloomberg Markets about the crucial role that artificial intelligence will play in detecting and responding to cyberattackers in 2018. It will be an AI war, with nation-state hackers and organized cybercriminals using their AI threat arsenal to attack organizations who use AI as a defensive weapon.

Read article

Security burnout: Avoidable or inevitable?

December 22, 2017

BetaNews

AI is the inevitable next phase in cybersecurity. What is avoidable, however, is security burnout. By implementing key business and professional-growth programs – and augmenting the work of security analysts with AI – organizations can greatly reduce the security burnout rate while nurturing and developing future security analysts.

Read article

Industry reactions to U.S. blaming North Korea for WannaCry

December 22, 2017

SecurityWeek

When WannaCry was first detected, we saw similarities in the code used for that ransomware attack with previous attacks attributed to North Korea, like the Sony hack. North Korea has been targeting banks directly with banking malware while using ransomware against other organizations to acquire a large volume of Bitcoin.

Read article

Emerging Tech Hub: Vectra hunts partners for threat detection platform

December 19, 2017

CRN

Vectra is hunting for channel partners in the UK after trebling its revenue in Q3, says Matt Walmsley, head of EMEA marketing. Vectra revenue jumped 294 percent in the third quarter this year, which Walmsley said was driven by a need for enterprises to address the detection gap that allows cybercriminals to easily breach networks.

Read article

How ready are you to stop an advanced attack?

December 19, 2017

CSO

In his latest installment in the CSO “Thinking Security” column, Vectra CTO Oliver Tavakoli explores the benefits of running red team exercises. Red team exercises enable organizations to understand how to respond when dealing with real-world advanced attacks and adapt to respond quickly to these threats.

Read article

AI is changing security ops: What security analysts need to know

December 19, 2017

TechBeacon

The security operations center at Texas A&M serves 11 universities and seven state agencies. But with just seven full-time analysts and a risk-rich environment of 174,000 students and faculty, triaging security events was overwhelming, but with the help of Vectra Cognito, and it now takes 10-20 minutes to resolve an incident, on average.

Read article

Savoir ce qui se passe vraiment sur SI: casse-tête du RSSI

December 19, 2017

Informatique

AI propose désormais de plus en plus de fonctionnalités de sécurité, en commençant par la possibilité d'automatiser le traitement de ces volumes de données, alertes, gérables et intégrant des algorithmes d'apprentissage automatique détectant le comportement agresseur, explique Christophe Jolly, directeur France chez Vectra.

Read article

Triton framework used in industrial control attacks

December 15, 2017

TechTarget

"To gain access to the industrial control systems, the threat actor infected an SIS engineering workstation on what is supposed to be an isolated network," says Chris Morales, Vectra head of security analytics. "An infected laptop can be brought in by a contractor, connect to the network and spread to the controlled ICS environment."

Read article

Nation-state attackers shut down industrial plant with new ICS malware

December 15, 2017

eSecurity Planet

"The IoT and IT/OT convergence is accelerated by the speed of business and the implementation of AI to drive decisions in ICS environments," says Chris Morales, Vectra head of security analytics. "In addition, more ICS devices are running commercial operating systems, exposing ICS systems to a wider swath of known vulnerabilities."

Read article

Traffic to major tech firms rerouted to Russia

December 14, 2017

SecurityWeek

People who use Google, Apple, Facebook and Microsoft trust that their communication is secure because of the use of HTTPS, says Chris Morales, Vectra head of security analytics. But entities can manipulate the border gateway protocol to perform man-in-the-middle attacks and manipulate TLS/SSL encryption to eavesdrop on users.

Read article

Researchers untangle Patchwork gang's cyberespionage attacks

December 13, 2017

SC Media

“The motivation of the attacker is always financial or competitive gain or theft of intellectual property,” says Chris Morales, Vectra head of security analytics. “The constantly changing landscape makes it nearly impossible to track cyberespionage organizations without a team of researchers focused on attribution.”

Read article

Oops...some HP laptops shipped with hidden keylogger

December 13, 2017

TechNewsWorld

Keyloggers are an important weapon in the arsenal of cyberattackers, says Chris Morales, Vectra head of security analytics. "They're often used in the recon phase of targeted attacks to steal user credentials and other sensitive information that are used to compromise user accounts. Keyboard loggers are hard to spot with consumer anti-virus."

Read article

2018 security predictions: More hacks from everywhere

December 12, 2017

DZone

"Data exfiltration from cloud-based storage will accelerate," says Vectra CTO Oliver Tavakoli. "This will occur at the cross-section of IaaS and PaaS. And organizations will often have no idea that their data has been stolen. Virtual forms of traditional security products will be powerless to contain this threat."

Read article

HP fixes hidden, deactivated keylogger in 460 laptop models

December 11, 2017

SC Media

"Why would a hardware vendor install this kind of software on their computers?" asks Chris Morales, head of security analytics at Vectra. "The key logger was a software development or test tool that should have been removed before the code was released. Any attacker could easily monitor everything a user does on their system.”

Read article

Cyberthieves loot tens of millions in bitcoin from NiceHash cryptocurrency marketplace

December 7, 2017

SC Media

“If you are risk averse, transfer deposits made to your bitcoin wallet to a hard currency account with a bank,” says Matt Walmsley, Vectra EMEA director. However, he added, "Many exchanges may limit the amount you can transfer in one instance and you may not be able to empty your account, so buyers beware.”

Read article

Bitcoin exchange NiceHash hacked as cryptocurrency hits new highs

December 7, 2017

eWeek

"This NiceHash attack is reminiscent of the Carbanak heist in which the sophisticated attackers used the bank's own tools to steal their money," said Chris Morales, head of security analytics at Vectra. Morales says the most important security controls monitor internal traffic for the misuse of administrative credentials and administrative protocols.

Read article

What is a botnet? And why they aren't going away anytime soon

December 6, 2017

CSO

"Consumers have no security controls to monitor botnet activity on their personal networks," Chris Morales, head of security analytics at Vectra, tells CSO magazine. "Security teams prioritize attacks targeting their own resources rather than attacks emanating from their network to external targets.”

Read article

What will be the single biggest security threat of 2018?

December 5, 2017

IDG Connect

"Exfiltration of data from cloud-based storage will accelerate," says Matt Walmsley, Vectra EMEA director. "Infrastructure-as-a-service (IaaS) and platform-as-a-service (PaaS) attacks will see massive tranches of data from organizations being taken from the cloud, without IT/security team even knowing."

Read article

Künstliche Intelligenz für Cybersicherheit

December 4, 2017

Retail Technology

Die Coop-Gruppe nutzt die auf KI basierende Cognito-Plattform von Vectra zur Erkennung von Cyberbedrohungen. Mit 2.476 Filialen und mehr als 85.000 Mitarbeitern ist Coop einer der größten Einzel- und Großhändler in der Schweiz.

Read article

Vectra ajoute du contexte avec le renseignement sur les menaces

December 1, 2017

LeMagIT

Cognito de Vectra utilise AI pour analyser le comportement des hôtes, puis s'appuie sur des algorithmes d'apprentissage automatique pour détecter les cyberattaques cachées dans les réseaux, notamment pendant les phases de reconnaissance interne, de mouvement latéral et d'extraction de données.

Read article

Most UK Uber users and drivers caught up in data breach

November 30, 2017

SC Media

"We're now at a time where artificial intelligence needs to be introduced to identify and respond to threats automatically and in real-time, a task that humans alone are simply incapable of performing at adequate scale and speed," says Matt Walmsley, Vectra EMEA director.

Read article

La machine auto-apprenante offre-t-elle une meilleure protection ?

November 30, 2017

Data News Magazine

“On ne consulte pas le contenu d'une boîte mail, mais le comportement du trafic sur un appareil et s'il s'agit ou non d'une tentative d'attaque," précise Chris Morales, responsable security analytics de Vectra. “On peut même constater des attaques sur un réseau crypté."

Read article

Vectra ajoute l'intégration d'intelligence de menace et les détections d'attaque d'Active Directory

November 29, 2017

Global Security Mag

Vectra intègre l'intelligence des menaces et les flux d'indicateurs de compromis (IoC) dans sa plateforme Cognito. La plateforme détecte également les activités de découverte d'attaquants ciblant les services Active Directory via LDAP et Kerberos.

Read article

Three lessons to learn from the Uber breach

November 24, 2017

eSecurity Planet

Chris Morales, head of security analytics at Vectra, notes that the challenge is that traditional security and methods for internal data centers don't have the same visibility in cloud environments. "Companies like Uber who rely on cloud infrastructure need a security strategy with processes and tools that provide visibility into cloud attacks."

Read article

Uber data breach wrap-up: Experts’ opinions

November 23, 2017

Security Boulevard

"Normal security tools and methods built for internal data centers do not have the same visibility in cloud environments where your systems and data are sharing a neighborhood (the internet and cloud apps) with millions and millions of other people, both good and bad," says Chris Morales, Vectra head of security analytics.

Read article

Kan de zelflerende machine u beter beschermen?

November 22, 2017

NetEvents

"Op universiteiten en hogescholen detecteren we vaak botnets op apparaten die bij binnenkomende studenten horen", zegt Chris Morales, hoofd beveiligingsanalyse bij Vectra. "Maar de meeste onderwijsinstellingen weten dit en zetten ze op een ander netwerk dat gescheiden is van hun kritieke netwerkinfrastructuur."

Read article

Uber hid massive hack compromising data of 57 million for a year

November 22, 2017

SC Media

“This breach happened at the same time Uber was under investigation by U.S regulators for the 2014 breach,” says Chris Morales, head of security analytics at Vectra. “There are many breach notification laws, especially in California, that require immediate notification to consumers. We are the ones put at risk here, not Uber.”

Read article

Uber data breach scandal: A shocked tech industry reacts to the cover-up

November 22, 2017

Computer Business Review

"The lesson here is don’t assume the same security tools used in a private cloud will protect you in the public cloud," says Chris Morales, head of security analytics at Vectra. "To detect malicious behavior in the public cloud, you have to know what can be attacked and understand how it would be done.”

Read article

The art of withholding data breaches as showcased by Uber

November 22, 2017

TEISS

“Organizations recognize that there is a need to prioritize the protection of citizen’s personal data through disclosure, but can be reluctant due to the impact a confession will have on their reputation and market value," says Matt Walmsley, EMEA director at Vectra. "This Uber breach of trust has rattled the regulators."

Read article

Datendiebstahl im großen Stil bei Uber

November 22, 2017

IT Daily

"Die einzige Möglichkeit, Zwischenfälle wie die bei Uber zu stoppen, besteht darin, zu akzeptieren, dass sich Angreifer bereits im Netzwerk befinden und sie schnell finden, bevor sie Schaden anrichten und Daten stehlen", sagt Gerard Bauer, Vice President EMEA bei Vectra.

Read article

Has everyone really been hacked?

November 21, 2017

SecurityWeek

"Anyone who performs an online transaction has personal data on the internet," says Chris Morales, head of security analytics at Vectra. "Even worse, personal information exists in places people are not even aware of or have any control over. The Equifax breach impacted more than 145 million consumers, and that's just one recent breach."

Read article

Real-time security using artificial intelligence

November 20, 2017

TAG Cyber

Automation and the use of artificial intelligence-based methods to detect, triage and correlate cyber security attacks in enterprise networks can be a powerful means for rapid risk reduction. We recently connected with Vectra CEO Hitesh Sheth to better understand how all this can be accomplished on a modern platform.

Read article

How humans blended with AI can better defend

November 17, 2017

Infosecurity

"AI automates repetitive tasks at massive scale and makes human security analysts better in the same way financial analysis tools enable bankers to be better," says Chris Morales, Vectra head of security analytics. "Similarly, AI can benefit from human intelligence by learning from the conclusions humans make based on AI’s automated analysis."

Read article

Death of the Tier 1 SOC analyst

November 16, 2017

Dark Reading

Texas A&M found a way to train the next-generation SOC analysts using Vectra. Dark Reading reports that the university added AI-based Vectra to the SOC to cut the time to vet alerts, a process that often took hours to reach the action phase. AI now provides context to alerts and now it only takes 15-20 minutes to triage them.

Read article

Verborgene Cyberangriffe schneller erkennen

November 15, 2017

CRN

Bei der automatisierten Erkennung von Cyberbedrohungen und für eine schnellere Reaktion auf solche Angriffe wollen Vectra und Phantom künftig zusammenarbeiten. Beide Unternehmen wollen ihre jeweiligen Kompetenzen in die Partnerschaft einbringen. Zudem steht nun die »Vectra-App for Phantom« zur Verfügung.

Read article

The smartest tools in cybersecurity: Artificial intelligence

November 15, 2017

Asia Pacific Security Magazine

"Once the attackers get inside, how do they sustain control, how do they move, how do they ultimately accomplish their goal?" asks Vectra CTO Oliver Tavakoli. "It can look more like a heist movie, a bank robbery of a vault where you have to go through a myriad of steps. That's where AI can help pore through the data."

Read article

Vectra joue la carte de l’intégration avec Phantom

November 15, 2017

LeMagIT

La détection des menaces est bonne; les traiter c'est mieux. Vectra se concentre sur le premier: son moteur Cognito analyse les flux du réseau, étudie le comportement des hôtes, puis s'appuie sur des algorithmes d'apprentissage automatiques pour le mouvement latéral, l'acquisition et l'extraction des données.

Read article

Vectra 2018 cybersecurity predictions

November 14, 2017

IT Security Guru

"We will see an uptake in the exfiltration of sensitive data at the cross-section of IaaS and PaaS," says Vectra CTO Oliver Tavakoli. "On top of this, organizations will often have no idea that their data has been stolen. Virtual forms of traditional security products will be powerless to contain this threat."

Read article

The hottest security products and the vendors who shape them

November 14, 2017

Dark Reading

When it comes to AI and machine learning, Vectra is one to watch, according to Dark Reading. Vectra was cited by Dark Reading for its playbooks that speed-up the response to in-progress cyber attacks, integration with other security products, and several patents for AI-based threat hunting.

Read article

Le distributeur suisse Coop choisit Vectra pour protéger son activité contre les cyber-attaques

November 13, 2017

Global Security Magazine

Vectra a annoncé la signature d'un accord pluriannuel avec Coop Group, l'une des principales entreprises suisses de vente en gros et au détail, pour installer Cognito, une plateforme de détection des menaces basée sur l'intelligence artificielle.

Read article

Security Operations automatisieren und Cyber-Angriffe schneller erkennen

November 13, 2017

Infopoint Security

Um den Zeitaufwand für Sicherheitsoperationen von Tagen auf Minuten zu reduzieren, haben Vectra und Phantom ihre Zusammenarbeit angekündigt und die Vectra App für Phantom-Lösungen entwickelt.

Read article

Fixes MIA for many Linux kernel flaws

November 11, 2017

LinuxInsider

The positive view is that the community constantly reviews Linux source code and can respond before attackers do, Chris Morales, head of security analytics tells LinuxInsider. "The negative view is that open source code is not maintained regularly and depends on an army of volunteers to keep safe. The truth is somewhere in between."

Read article

Leading Swiss retailer uses Cognito AI platform to reduce cyber risk

November 10, 2017

Digitalisation World

The Coop Group decided that network perimeter defenses were insufficient to safeguard customer information, internal systems and point of sale systems. As a result, Coop selected Vectra artificial technology to detect and respond to cyber-attacks in real time and prevent or significantly mitigate the impact of a data breach.

Read article

Coop Group installs AI cybersecurity tech

November 10, 2017

Retail Systems

Coop chose Vectra after identifying significant economic and security gains resulting from the introduction of AI security automation. After evaluating multiple solutions, it turned to Vectra and its Cognito AI platform to help protect them detect cyber attacks in real time and speed response by augmenting their security operations team.

Read article

Vectra and Phantom partner to detect hidden threats faster

November 10, 2017

IT Security Guru

“Vectra and Phantom share a mission to automate threat detection and response,” said Mike Banic, Vectra vice president of marketing. “Our Cognito platform automates the threat detection, triage, correlation and prioritization, and our partnership with Phantom enables automated security orchestration with a broad ecosystem of partners.”

Read article

Millions of Android apps at risk from Eavesdropper vulnerability

November 9, 2017

Infosecurity

“The risk with third-party services is exposure through unknown system and application vulnerabilities," says Chris Morales, head of security analytics at Vectra. "Organizations should do their own security assessments of third-party services and externally monitor the activities on these services, independent of the service provider."

Read article

Ten best tech startups in San Jose

November 9, 2017

The Tech Tribune

Vectra, makes the Tech Tribune's Top 10 list of best startups in San Jose. In conducting its research, the Tech Tribune editorial staff considered several critical factors for its Top 10 list, including revenue potential, leadership team, brand and product traction, and competitive landscape.

Read article

Machine learning erkennt Anomalien

November 9, 2017

LANline

Wenn Cybersicherheit auf den Netzwerkperimeter beschränkt ist, kann man nur eine oder zwei Phasen eines Angriffs sehen, schreibt Gerard Bauer, Vice President EMEA bei Vectra. Die Überwachung des Netzwerks von innen bietet jedoch viele weitere Möglichkeiten, um viele weitere Phasen eines aktiven Angriffs zu erkennen.

Read article

Coop rüstet sich gegen Cybercrime

November 9, 2017

IT Business

Das Security-Unternehmen Vectra hat einen Vertrag mit der Coop-Gruppe für den mehrjährigen Einsatz von Cognito geschlossen. Mit Cognito bietet Vectra eine KI-basierte Plattform (künstliche Intelligenz) für das Entdecken und Erkennen von Cyberbedrohungen.

Read article

Predictive analytics: Fad or the future of cybersecurity?

November 7, 2017

Business Computing World

Oliver Tavakoli, the CTO of cyber security vendor Vectra, explains that nation-states, hackers and organized cybercrime groups will develop new vectors to defeat predictive capabilities. “After several years spent trying to perfect predictive analytics, attackers will counter with feints and pattern randomization,” Tavakoli says.

Read article

Seven sure-fire ways to fail at data analytics

November 7, 2017

CIO

Organizations need to “clean out debris — incomplete and broken data — and massage data from different sources to make it compatible, comprehensible and as easy as possible to analyze,” says Vectra CTO Oliver Tavakoli. “Make the data as self-describing as possible so all members of the team understand the meaning of the various bits.”

Read article

Who wins in a world of 100% encrypted traffic?

November 6, 2017

CSO

“Different applications and processes have unique communication patterns," Vectra CTO Oliver Tavakoli writes in CSO. "Attacker traffic often looks different from user traffic, whether it is encrypted or not. Instead of looking inside the encrypted stream, sophisticated math is used to find signals that indicate a threat.”

Read article

Arabic, Urdu, Persian, Pashto InPage processor used by three malware families

November 6, 2017

SC Media

“We see this trend all the time in targeted attacks,” says Chris Morales, head of security analytics at Vectra. “Attackers understand their target's working environment, identify key software to compromise, and then once they establish a foothold, the attacker begins to snoop around for data to steal.”

Read article

Amazon Key unlocked: Why Amazon wants to get its foot in your front door

November 6, 2017

TechRadar

Amazon Key allows couriers to open your front door and drop-off a package using a digital keyless lock and cloud cam. But can it be hacked? Matt Walmsley, EMEA director at Vectra, comments on the security concerns and the ease in which hackers can compromise webcams.

Read article

Researchers find multiple malware families leveraging InPage exploit

November 3, 2017

SC Media

“We see this trend all the time in targeted attacks,” says Chris Morales, head of security analytics at Vectra. “Attackers identify key software to compromise to initially infect the target, establish a foothold and begin to snoop around for data to steal.”

Read article

Five characteristics of AI technologies worth investing in

November 1, 2017

VentureBeat

"I was an investor in Vectra during my time at Intel Capital," writes Ken Elefant at Sorenson Capital. "By comparing outside network data to the log inside the enterprise, Vectra can automate the process of detecting attacks. Human workers simply could not wrap their arms around such a broad distribution of information."

Read article

Security experts air concerns over hackers using AI and machine learning for phishing attacks

October 30, 2017

Computer Weekly

Trying to make sense of machine learning data from phishing campaigns is often inefficient and impractical. But security companies can use machine learning to "unlock patterns in large swaths of data to detect something in real time and make a decision,” says Vectra CTO Oliver Tavakoli.

Read article

Using machine learning for threat detection

October 27, 2017

IT World Canada

The city of Peterborough, Ontario tried Darktrace and Vectra Cognito. It chose Vectra. After deploying Cognito, “We left it alone for a couple of days to learn and that was it," says Nick Powers, the city's IT security manager. “We are better positioned from incident detection and response than we were six months ago."

Read article

Zero-day malware: A threat SDN can miss

October 26, 2017

Telco Transformation

In the shadowy cybersecurity world, artificial intelligence is highly touted as a means to find the clues to lurking malware. Using artificial intelligence, "we focus on the duration, timing, frequency, and volume of network traffic," says Chris Morales, head of security analytics at Vectra. "Data on a sequence of activities points to hidden risks."

Read article

The huge security threat of misconfigured cloud and how to fix it

October 26, 2017

Data Center Knowledge

Accenture accidentally revealed internal data when it allowed public access to four of its Amazon storage buckets. "They were fortunate that it was discovered by someone who helped prevent damage," says Vectra CEO Hitesh Sheth. "It could have easily been used for snooping and data gathering on large enterprises with very harmful effects."

Read article

Cyber insurance could lower risk of hacks before an M&A deal is completed

October 20, 2017

TheStreet

"Knowing that attackers may have free rein in a network for 99 days before they are detected, acquiring companies should be prepared for the potential risk and liability of a cyberattack for at least one quarter past the close of a deal," says Vectra CEO Hitesh Sheth.

Read article

Predictive analytics: Fad or the future of cybersecurity?

October 19, 2017

IT Security Guru

Vectra CTO Olivier Tavakoli explains that nation-states, hackers and organized cybercrime groups will develop new vectors to defeat predictive capabilities. “After years spent trying to perfect predictive analytics, attackers will counter with feints and pattern randomization,” Tavakoli tells IT Security Guru.

Read article

How AI can help you stay ahead of cybersecurity threats

October 19, 2017

CSO

DAQRI, a maker of augmented reality for the industrial workplace, uses Vectra to monitor network traffic from 1,200 devices. "When you look at traffic, you can see if someone is doing port scans, jumping from host to host or transferring large amounts of data in an unconventional way," says Minuk Kim, senior director of IT and security at DAQRI.

Read article

How to protect your Wi-Fi network from a Krack attack

October 18, 2017

Computer Weekly

"Enterprises need to increase their visibility inside the network to automatically detect, analyze and respond to nefarious behaviors before they have time to escalate into critical security incidents," says Matt Walmsley, EMEA director at Vectra.

Read article

Was Sie zu Machine Learning und KI wissen sollten

October 13, 2017

Security Insider

Mehr Sicherheitsprodukte verwenden künstliche Intelligenz und maschinelles Lernen, um Bedrohungen zu erkennen. Das AI-basierte Cybersecurity-Unternehmen Vectra gibt neun Tipps, wie Lösungen bewertet werden können.

Read article

Video: Russian government hackers reportedly used Kaspersky software to steal NSA secrets

October 6, 2017

Fox Business News

Vectra CEO Hitesh Sheth talks with Fox Business News about the recent theft of U.S. classified information from an NSA contractor’s computer by hackers who were reportedly working for the Russian government.

Read article

AI security startups target talent crunch

October 5, 2017

Futuriom

Last week, Vectra announced that European glass manufacturer Vetropack Group would use Vectra's AI cybersecurity software. Vetropack officials say that offloading its security team was one of the goals in implementing Vectra's platform, which can be used to analyze data from many sources.

Read article

Deep learning: Cybersicherheit, die denkt, denkt tiefer

October 2, 2017

Silicon

Auch im Falle des maschinellen Lernens im Kampf gegen Cyber-Bedrohungen braucht man die richtigen Werkzeuge. Die Implementierung des optimalen ML-Tools für jeden Angriffsdetektionsalgorithmus ist eine effektive Strategie, da jede Methode ihre eigenen Stärken hat.

Read article

l’intelligence artificielle est la réponse pour parer les malwares

October 2, 2017

Global Security Mag

Pour sa première participation aux Assises de la Sécurité, Vectra présentera ses solutions qui utilisent l’intelligence artificielle pour transformer la cybersécurité. Pour Christophe Jolly, Directeur France de Vectra, l’intelligence artificielle est la réponse pour parer les malwares de toutes sortes.

Read article

Sicher in der Public Cloud und Schutz im Rechenzentrum

September 29, 2017

IT Daily Net

Vectra, führend in der Automatisierung der Erkennung laufender Cyberangriffe mittels künstlicher Intelligenz (KI) und maschinellem Lernen (ML), stellt auf der diesjährigen it-sa 2017 zahlreiche Neuerungen vor.

Read article

Mit Künstlicher Intelligenz gegen die reale Bedrohung

September 29, 2017

BigData Insider

Angesichts neuer Bedrohungsszenarien und sich wandelnder Rahmenbedingungen in der Cybersicherheit bewähren sich zunehmend automatisierte Sicherheitslösungen auf Basis Künstlicher Intelligenz.

Read article

Künstliche Intelligenz hilft bei Hacker-Abwehr

September 28, 2017

IT-Zoom

„KI sollte dazu dienen, die Tätigkeit menschlicher Analysten zu unterstützen, damit diese ihren Job smarter und effizienter erledigen können," betont Gérard Bauer, vice-president EMEA bei Vectra. „In der Praxis bedeutet dies, die Arbeitslast zu reduzieren, damit sich die Security-Teams auf die wichtigsten Vorkommnisse konzentrieren können.“

Read article

Vetropack uses AI to reveal cyber threats and take action before damage is done

September 28, 2017

Information Security Buzz

Vectra CEO Hitesh Sheth says “Artificial intelligence allows enterprises to augment their security teams to automate detection and response to security incidents. That allows security analysts at companies like Vetropack to remain in control and stop attacks faster.”

Read article

New hack, BlueBorne, can access phones and computers via bluetooth

September 16, 2017

NBC News Los Angeles

Oliver Tavakoli, CTO of Vectra, said “Lock things down that you’re not using. Don’t expose yourself to more risk for the things you are using. Be diligent about updating.”

Read article

New hack, BlueBorne, can access phones and computers via bluetooth

September 15, 2017

NBC Bay Area

Oliver Tavakoli, CTO of Vectra, said “Lock things down that you’re not using. Don’t expose yourself to more risk for the things you are using. Be diligent about updating.”

Read article

Apache mounts strong defense, Equifax retreats

September 14, 2017

Ecommerce Times

Chris Morales, head of security analytics at Vectra weighs in on the Equifax data breach.

Read article

Apache mounts strong defense, Equifax retreats

September 14, 2017

TechNewsWorld

Chris Morales, head of security analytics at Vectra weighs in on the Equifax data breach.

Read article

Apache mounts strong defense, Equifax retreats

September 14, 2017

LinuxInsider

Chris Morales, head of security analytics at Vectra weighs in on the Equifax data breach.

Read article

The internet of things: Success or bust?

September 13, 2017

Information Age

Matt Walmsley, EMEA director of Vectra, warns "While the IoT may be bringing more devices onto the network than ever, these devices are rarely truly hardened, patched or updated. Their creators may have decades of electrical and mechanical engineering experience, but often lack experience of computer programming or internet security."

Read article

Data of 143 million consumers attacked

September 8, 2017

Report

Equifax, one of the three largest business agencies in the US, has been successful in hacking its IT systems. "Companies should focus their attention and investment on the detection of ongoing attacks. Hacker attacks need to be detected and addressed more quickly, "said Gérard Bauer, VP EMEA at Vectra, a provider of cyber-security solutions based on artificial intelligence.

Read article

New infosec products of the week: September 8, 2017

September 8, 2017

Help Net Security

“Vectra is advancing automated threat hunting with the introduction of Attack Campaigns. The Vectra Cognito platform now further automates threat hunting by exposing the relationships between threat detections on separate workloads and devices to understand the activity and scope of attack campaigns.”

Read article

Equifax struck by huge breach

September 8, 2017

Electronic Payments International

Chris Morales, head of security analytics at Vectra, said: “Equifax needs to raise their cybersecurity score. Enterprises have to realise they cannot address cybersecurity by simply spending money on intrusion prevention solutions and instead need to shift investments to detection and response solutions that are being used by today’s advanced attackers.

Read article

Huge Equifax breach hits 143 million consumers

September 8, 2017

FinExtra

Commenting on the leak, Chris Morales, head of security analytics at Vectra, said “Enterprises have to realise they cannot address cybersecurity by simply spending money on intrusion prevention solutions and instead need to shift investments to detection and response solutions that are being used by today’s advanced attackers.”

Read article

Equifax data breach: Tech reacts to massive cyber hack

September 8, 2017

Computer Business Review

Chris Morales, head of security analytics at Vectra, said “Equifax needs to raise their cybersecurity score. Enterprises have to realise they cannot address cybersecurity by simply spending money on intrusion prevention solutions and instead need to shift investments to detection and response solutions that are being used by today’s advanced attackers.”

Read article

Web app vulnerability enables Equifax breach affecting up to 143 million

September 8, 2017

SC Magazine

Chris Morales, head of security analytics at Vectra commented "Enterprises have to realise they cannot address cyber-security by simply spending money on intrusion prevention solutions and instead need to shift investments to detection and response solutions that are being used by today's advanced attackers.”

Read article

AI revolutionizes cyber security

September 6, 2017

Security Insider

Artificial Intelligence (AI) is considered a major future trend for many areas of technology. From the smartphone, to car and home automation, to customer analysis and even to counter cyber attacks, KI is to revolutionize the technology.

Read article

SOAPA is having a positive impact on cybersecurity

September 1, 2017

CSO

Mike Banic, Vectra Networks' vice president of marketing, discusses SOAPA's effect on cybersecurity, including data collection, technology integration, machine learning, and partner ecosystems.

Read article

Talking SOAPA with Vectra Networks (Video, Part 1)

August 31, 2017

ESG Global

Mike Banic, Vectra Networks' vice president of marketing, discusses SOAPA's effect on cybersecurity, including data collection, technology integration, machine learning, and partner ecosystems.

Read article

Wannacry attackes still lingering

August 28, 2017

IT-Daily

Many enterprise organizations are currently evaluating the Vectra Cognito platform, and over the past weeks, several customers detected WannaCry attacker behaviors. Just because the headlines stopped, doesn’t mean that the attack did.

Read article

Finding cyber threats by AI

August 28, 2017

ComputerPartner

The Vetropack Group, a leading European manufacturer of packaging glass, uses Vectra's cybersecurity platform as the basis for protecting its central systems and information and for more effective organization of its security operations.

Read article

Using artificial intelligence and machine learning to augment, not replace, cybersecurity capabilities

August 23, 2017

Safe Travels

Vectra Networks' Chief Technology Officer, Oliver Tavakoli, discusses how government agencies can benefit greatly by selecting artificial intelligence to augment - not replace - their cybersecurity teams.

Read article

Comparing private and public cloud threat vectors

August 22, 2017

Dark Reading

Many companies moving from a private cloud to a cloud service are unaware of increased threats. It's worth examining the differences in private versus public clouds when it comes to threats that applications and data encounter. When I talk to customers about the differences, I use a metaphor of what's happening onstage versus backstage.

Read article

Why cybercriminals like AI as much as cyberdefenders do

August 22, 2017

Information Management

Penny Crosman writes about how IT teams as well as cyber attackers use artificial intelligence. Greenhill & Company’s CIO, John Shaffer discusses his use of Cognito, “What you’re really interested in is trying to figure out what the smart actors are doing. That’s where machine learning and AI come into play.”

Read article

Military

August 22, 2017

Using artificial intelligence and machine learning to augment, not replace, cybersecurity capabilities

Using artificial intelligence and machine learning to augment, not replace, cybersecurity capabilities

Read article

Comparing Private and Public Cloud Threat Vectors

August 22, 2017

InformationWeek IT Network

As more companies are considering putting mission-critical applications and data into the public cloud, it's worth examining the differences in private versus public clouds. The lesson: don't assume that the same tools you use in your private cloud will adequately protect you in the public cloud.

Read article

Using artificial intelligence and machine learning to augment, not replace, cybersecurity capabilities

August 21, 2017

Bloomberg Government

Vectra Networks' Chief Technology Officer, Oliver Tavakoli, discusses how government agencies can benefit greatly by selecting artificial intelligence to augment - not replace - their cybersecurity teams.

Read article

Why cybercriminals like AI as much as cyberdefenders do

August 18, 2017

AITopics

Penny Crosman writes about how IT teams as well as cyber attackers use artificial intelligence. Greenhill & Company’s CIO, John Shaffer discusses his use of Cognito, “What you’re really interested in is trying to figure out what the smart actors are doing. That’s where machine learning and AI come into play.”

Read article

Why cybercriminals like AI as much as cyber-defenders do

August 18, 2017

S.H.E Daily

Penny Crosman writes about how IT teams as well as cyber attackers use artificial intelligence. Greenhill & Company’s CIO, John Shaffer discusses his use of Cognito, “What you’re really interested in is trying to figure out what the smart actors are doing. That’s where machine learning and AI come into play.”

Read article

Why cybercriminals like AI as much as cyberdefenders do

August 17, 2017

American Banker

Penny Crosman writes about how IT teams as well as cyber attackers use artificial intelligence. Greenhill & Company’s CIO, John Shaffer discusses his use of Cognito, “What you’re really interested in is trying to figure out what the smart actors are doing. That’s where machine learning and AI come into play.”

Read article

Autonomous detection of cyber threats

August 16, 2017

IT-Daily

Vectra, a provider of automated detection of ongoing cyber attacks, has received five new patents in the United States for advanced analysis of IT security automated by artificial intelligence (AI).

Read article

Was CFOs aus Hackerangriffen lernen können

December 29, 2016

Finance Magazine

Erfolgreiche Cyberattacken auf Konzerne häufen sich. CFOs sollten daher genau überlegen, ob sie bei Investitionen in die IT-Sicherheit auf die Bremse treten. Denn Einsparungen an der falschen Stelle können den wirtschaftlichen Erfolg eines Unternehmens schnell gefährden. Hitesh Sheth, CEO bei Vectra Networks erklärt in FINANCE, warum vor allem immer öfter firmeneigene Rechenzentren Ziel von Hackerangriffen werden.

Read article

How artificial intelligence will solve the security skills shortage

December 28, 2016

Dark Reading

The infosec world is embracing artificial intelligence and the seismic changes it will bring to threat detection and mitigation, Vectra CSO Günter Ollmann writes in Dark Reading. As networks become more sophisticated, generate more data, and are exposed to advanced threats, AI and the automation it empowers are the cure.

Read article

The truth is, the Yahoo! data breach is not the exception

December 28, 2016

Bloomberg Radio

The magnitude of the Yahoo! data breach – more than 1 billion user accounts compromised – is by far the largest that has ever occurred. But Yahoo! is not the exception. Routers, switches and servers in the vast majority of data centers where customer account information is kept are largely unprotected and highly vulnerable to cyber attacks.

Read article

Video: Cybersecurity woes in the U.S.

December 22, 2016

CNBC

The incoming U.S. administration would be well advised to take the recent Democratic and Republican National Committee hacks seriously, Vectra CEO Hitesh Sheth tells CNBC. "We can safely assume that nation-state actors will continue their efforts to affect U.S. economic interests as well as our democratic and political processes."

Read article

What the infosec jobs sector will look like in 2017

December 22, 2016

CSO

Vectra CSO Gunter Ollmann says that experienced infosec employees are twice as valuable to the global market, demanding higher pay and improved roles. To retain them, organizations are offering “senior” titles and accompanying pay hikes. Meanwhile, the skills and job tasks between “junior” and “senior” remain unfulfilled.

Read article

Insurance claims for data breaches are on the rise

December 21, 2016

Information Security Buzz

On news that data breach insurance claims are being made at a rate of over one a day, Matt Walmsley, Vectra EMEA director, says “By automating detection using the very latest self-learning security tools, and with it the response to an incident based on early indicators, many attacks can be nipped in the bud before they become costly incidents.”

Read article

Remain paranoid, err vigilant, with online security in 2017

December 20, 2016

CSO

There are a lot more tools necessary and available to combat the cyber threat, at the edge, at the endpoint and in between. “It is important to identify, develop and train associates who are motivated cyber warriors, and it is an ongoing process, due to the velocity of change," says Joe Duffey, CISO at Natixis Global Asset Management.

Read article

Encrypt everthing. Don't let security be the reason you don't (and attackers do)

December 20, 2016

IT Security Guru

Chris Morales, head of security analytics at Vectra, says encrypted network traffic is having an impact on security that relies on deep packet inspection, whose efficacy degrades as more traffic is encrypted. Even worse, traditional security responses to handling encrypted traffic will suffer due to certificate and public key pinning built into applications.

Read article

Data breach claims are made at a rate of more than one a day

December 20, 2016

Claims Magazine

Matt Walmsley, EMEA director at Vectra , says that a rise in claims for digital theft and intrusions was taking place amid growing nation state-driven cyber crimes and the looming risk posed by GDPR compliance requirements and punitive fines. There is also growth in corporate cyber extortion using ransomware and malware.

Read article

What 2017 has in store for cybersecurity

December 19, 2016

CSO

Chris Morales, head of security analytics at Vectra, tells CSO that critical firewall vulnerabilities will continue to be ignored in 2017. According to the Shadow Server website, there are still more than 816,000 Cisco firewalls connected to the Internet that are vulnerable, undermining the inherent trust placed in firewalls.

Read article

AI: Revolutionizing the information security industry

December 19, 2016

SC Media

Günter Ollmann, CSO at Vectra, explores how the information security industry is starved of experienced security workers and how it is proving detrimental to its advancement and exposing IT systems and Internet businesses to criminality and ransom. In the next 25 years, AI defense systems will unleash unimaginable ways to combat cyber threats.

Read article

Cybersecurity predictions

December 19, 2016

Information Security Buzz

Hitesh Sheth, CEO at Vectra, outlines his top cybersecurity predictions for 2017. Attacks on the U.S will increase during Drumpf’s administration, new forms of ransomware will become a big headache for security response teams, data center attacks will increase, and firewall vulnerabilities will continue to be ignored.

Read article

InfoSec skills shorage: The No. 1 threat to Internet security

December 17, 2016

Information Security Buzz

It is estimated that today there are over 1 million InfoSec positions unfilled – growing to over 1.5 million by 2019 – and more than 200,000 of those vacancies are in the U.S. This global shortage of expertise and experience lies at the very heart of the InfoSec world’s ability to respond to cyber attacks – affecting vendors and consumers alike.

Read article

Hackers may go holiday shopping online, too

December 15, 2016

Network World

Employees who reuse credentials or shop from their work computers are at risk, says Chris Morales, head of security analytics at Vectra. Fake Best Buy or Amazon promotional emails could be a phishing attack infecting computers with ransomware or exploits to initiate a targeted cyber attack, while everyone is supposed to be enjoying holiday cheer.

Read article

Data center security – Is it safe?

December 15, 2016

Network Computing

Data centers are the main repository for digital assets and resources, and their high value makes them a target for attackers. But threats in the data center are relatively mature by the time they manifest. With more assets residing in data centers than ever before, how safe is it? Matt Walmsley, EMEA director at Vectra, explains.

Read article

Device agnostic IoT security

December 15, 2016

Network Computing

With more unmanaged and seldom-updated devices connecting to our networks, behavior-based security is an essential line of defense. It ensures that unusual activity and volume are quickly identified and addressed, and this can be done regardless of the device being targeted. Matt Walmsley, EMEA director at Vectra, makes the case.

Read article

Who's afraid of APT?

December 15, 2016

Computing Security

What can organizations who expect to be a target do about an APT? And how sure can anyone really be that they are ready to respond? Expecting the unexpected is a difficult task, says Matt Walmsley, EMEA director at Vectra, quite reasonably, although in terms of cyberattacks the truth is that prevention alone fails.

Read article

US-Wahl 2016 und der Umgang mit Big Data

December 13, 2016

IT Sicherheit

Große Daten-und Datenwissenschaften können verschiedene Arten von Prognosen zu erstellen. Das Brexit-Referendum und die US-Wahlen von 2016 führten zu zwei Ergebnissen, die sich stark von den vorhergesagten Ergebnissen unterschieden. David Pegna, Leiter der Data Science bei Vectra, erklärt, was Cyber-Sicherheit aus den großen Datenfehlern lernen kann.

Read article

Bigger walls won't keep data safe

December 6, 2016

TMCnet

For years, the security community focused on perimeter defenses, but ensuring all is well requires more than building a bigger wall. Hackers only need about 146 days to spy, spread and steal, according to Mike Banic, vice president of marketing at Vectra. And it only takes about three days for an attacker to gain administrative credentials.

Read article

Where cybercriminals go to buy your stolen data

December 5, 2016

Dark Reading

Darknet website AlphaBay sells tens of thousands of items related to malware, exploits, hacked accounts, stolen credentials, and hacking services. Christopher Doman, a threat analyst at Vectra, talks about the AlphaBay market and forum and explains the various ways this information can be used for nefarious purposes.

Read article

Evaluating AI-powered threat detection technologies

December 2, 2016

IT Security Guru

Unlike signature-based detection systems, today’s AI-powered security technologies are rarely suited to a plug-it-in-and-watch-it-light-up evaluation strategy. They often include a mix of supervised and unsupervised machine learning, automated threat hunting, trained classifiers, and focus on reducing erroneous and unactionable alerts.

Read article

Compliance doesn’t equal security but it sure does help

November 29, 2016

SC Media

As more business decisions rely on big data analytics, cybercriminals have greater incentive to pollute the incoming data to alter decisions or make them predictable so they can be monetized, says Vectra CTO Oliver Tavakoli. This can cause a hedge fund to buy or sell a stock. “Criminals can make large sums of money front-running the transaction.”

Read article

What will the next ransomware note say?

November 23, 2016

ITSPmagazine

In 2017, ransomware will be used with other techniques for blended attacks, says Vectra CSO Günter Ollmann. Despite ransomware detection improvements made in 2016, most organizations still do not have a sufficient offline backup strategy to restore files, whether the ransom is paid or the attacker provides the encryption key.

Read article

DHS hiring puts into question the cybersecurity skills shortage

November 23, 2016

SearchSecurity/TechTarget

"Everyone with a newly minted computer science degree is being encouraged to get into cybersecurity, as the lack of candidates is driving up salaries," says Vectra CSO Günter Ollmann. Although the U.S. Department of Homeland Security event "was pitched under the banner of cybersecurity, it is not clear what jobs were actually being filled."

Read article

Who has the most impact in driving security advancement?

November 22, 2016

CSO Online

"The CISO usually becomes the person who drives both the strategy and the budget," says Vectra CEO Hitesh Sheth. "They usually have a team." It's often seen in the Fortune 50 companies that "the CISO is still heavily involved, but the board is involved as well. It has become a regular topic among the board of directors."

Read article

How AI will transform cybersecurity

November 22, 2016

VentureBeat

The challenge of detecting attack behaviors in network traffic is immense. Finding correlations across protocols without intrusive deep packets inspection requires analyzing thousands of correlations between metadata from internal and external network traffic. A few companies are using AI technology to tackle this challenge, including Vectra.

Read article

Cybersecurity predictions for 2017

November 22, 2016

VMblog

Alex Waterman, senior director of product management at Vectra, predicts that cybercriminals will step up their efforts to corral legions of unprotected IoT devices to mount even more sophisticated attacks. Also, the attack tools published by the Shadow Brokers hacking group will be used against the data center’s vulnerable physical infrastructure.

Read article

Cybersecurity predictions for 2017

November 22, 2016

VMblog

Alex Waterman, senior director of product management at Vectra, predicts that cybercriminals will step up their efforts to use more vulnerable IoT devices to mount attacks and the tools published by the Shadow brokers hacking group will be used against the data center’s unprotected physical infrastructure.

Read article

Three mobile cyber attack: 6 million customers’ details exposed

November 21, 2016

Information Security Buzz

“It’s troubling that the breach was discovered only after receiving complaints from customers that scammers were fishing for their bank account details," says Vectra CTO Oliver Tavakoli. "With the availability of real-time detection methods today that identify what’s happening at any given moment, this lack of awareness is shocking."

Read article

Election 2016: The bungling of big data

November 21, 2016

IT Security Guru

The accuracy of polling results failed miserably in the 2016 election. From a data science perspective, what are the lessons learned from the big data polling blunders in election predictions? The lesson is all about using the right data for the problem at hand, and not about questioning if the data is right. The same applies for cybersecurity.

Read article

Camouflaging state-sponsored malware attacks

November 21, 2016

RSA Conference

Most organizations continue to struggle with malware-based intrusions, according to this column written by Vectra CSO Günter Ollmann. Despite the deployment of policies, user education, enforcement chokepoints, data inspection, and regular assessments of defenses, malware remains the primary method of breaching the corporate network.

Read article

Passcode influencers: Trump won’t improve cybersecurity

November 21, 2016

The Christian Science Monitor

"Just as hacking, cybersecurity and email breaches have been core to the election process, they will continue to grow and affect the U.S. government," says Vectra CSO Günter Ollmann. "Hence, in Trump's presidency, the U.S. government and agencies will have their hands forced in dealing with this invasive hacking epidemic.

Read article

Data integrity: The next big threat

November 18, 2016

SC Magazine

Vectra CTO Oliver Tavakoli explains to SC Magazine that the variety, volume and velocity inherent in big data makes it difficult to ensure integrity of all of the data. To combat this challenge, Tavakoli encourages organizations to always pay attention to where the data is coming from and to encrypt the data.

Read article

IT Sicherheit – Intelligente Abwehr

November 14, 2016

VDI Nachrichten

Traditionelle IT-Sicherheitslösungen gelangen an ihre Grenzen und können keinen ausreichenden Schutz mehr bieten. Im Zuge dieser Entwicklung setzt sich die künstliche Intelligenz (KI) als neuartiger Sicherheitsansatz immer weiter durch. Oliver Tavakoli, CTO bei Vectra berichtet in einem aktuellen Beitrag auf VDI Nachrichten, worin die Vorteile des maschinellen Lernens liegen.

Read article

Unfilled jobs are the biggest threat to cybersecurity

November 10, 2016

ThirdCertainty

A global shortage of expertise lies at the heart of the infosec world’s ability to respond to attacks and has considerable effect on vendors and consumers alike. Vectra CSO Günter Ollmann explains why unfilled jobs are the biggest threat to the cybersecurity industry, and identifies three ways to approach the problem.

Read article

Brute force: Understanding automated cyber attacks

November 9, 2016

The Realtime Report

Every new technology that guards against cyberattacks forces hackers to evolve. Automated attacks are now capable of learning to use an application and carrying out its basic functions. For example, Wade Williamson, director of threat research at Vectra, says banking malware can transfer money belonging to a compromised account.

Read article

IoT security tips to protect your small business

November 8, 2016

Small Business Computing

"You should keep Internet-enabled devices – like video cameras—on a separate network from the primary business network that deals with customer financial transactions, like point of sale systems, intellectual property, or any form of regulated data," said Chris Morales, head of security analytics at Vectra.

Read article

The worst people you meet in IT security: The 'ever-helpful'

November 7, 2016

CSO

Vectra CSO Günter Ollmann chastises "the person who holds open a secure door for a slow moving 'employee' without checking for a badge. One of the easiest ways to infiltrate a secure building or data center is to appear encumbered (e.g., having both hands full with boxes) and wait for an authorized person to open the door for you."

Read article

How to stop the Mirai botnet: Can blocking Port 23 fight further DDoS attacks?

November 3, 2016

International Business Times

One of the biggest reasons we now have the Mirai botnet is that "the (IoT) manufacturers are trying to save money and reduce the time to market, and only after the product has been proven to be popular do they go back and add security to it," Vectra CSO Günter Ollmann tells the International Business Times.

Read article

What these CSOs did on their first days

November 3, 2016

CSO

Vectra CSO Günter Ollmann weighs in on the most vital areas of focus for new CSOs during their first weeks on the job and shares advice for prioritizing problem areas. Ollmann also shares two different yet critically important perspectives on security – vendor and non-vendor – and what to take care of on day one.

Read article

Hackers coordinate targeted attacks against Middle East entities

October 27, 2016

Information Security Buzz

“Whether it’s freedom fighters or terrorists, the cyber-domain is an important theatre for propagating a cause," says Vectra CSO Günter Ollmann. "Tools that target the opposition and gather valuable intelligence are in play by small and large groups around the world. Cyber warfare isn’t just the domain of large nation-state actors.”

Read article

Middle Easterners targeted in 'Moonlight' espionage campaign

October 27, 2016

SecurityWeek

Researchers at Vectra Networks have been monitoring the group for the past two years and determined that its operations focus on Middle Eastern political issues. The threat actor has been dubbed “Moonlight” based on the name of a command-and-control (C&C) domain used in the attacks.

Read article

Phishing techniques infect political targets with Trojan malware

October 26, 2016

ZDNet

Moonlight group is likely to be involved in cyberespionage, warns Vectra Networks. “They put effort into crafting the emails, the websites, the documents they've created, putting a fair amount of energy into it. But beyond that the underlying tech is off the shelf," says Vectra CTO Oliver Tavakoli, emphasizing how attackers don't need sophisticated hacking skills.

Read article

'Moonlight' APT uses H-Worm backdoor to spy on targets

October 26, 2016

Softpedia

Identified by Vectra Networks, this particular campaign used spear-phishing emails and social media lures to trick targets into installing the H-Worm malware. H-Worm creates a backdoor that can be used to further compromise targets with a remote access Trojan called njRat.

Read article

'Moonlight' Middle East hacking group exposed

October 26, 2016

The Register

A hacking group is running a wide ranging cyber-espionage campaign against targets in the Middle East. Security firm Vectra Networks says it has identified over 200 samples of malware generated by the group over the last two years. The assaults are not technically sophisticated but nonetheless tricky in their use of social engineering tactics.

Read article

Keeping zombie botnets out of your home network

October 24, 2016

USA Today

Your router, home Wi-Fi, refrigerator and webcams could be part of an international army of zombie attackers. “A newly installed Wi-Fi home router is likely to be compromised within weeks if the default passwords are not changed – or within a few hours if you live in a more densely populated metropolitan area,” says Vectra CSO Günter Ollmann.

Read article

Funkschau: Ransomware – Keinen hohen Preis zahlen

October 18, 2016

Funkschau

Das berichtet Gérard Bauer, Vice President EMEA bei Vectra Networks, auf Funkschau.de. Der Experte gibt Einblick, wie sich Cyber-Kriminelle Zugang zu Unternehmensnetzwerken verschaffen und wie sich Firmen vor hochprofesionellen Ransomware-Angriffen schützen können.

Read article

C-suite career advice: Hitesh Sheth, Vectra Networks

October 11, 2016

IDG Connect

Vectra CEO Hitesh Sheth offers career advice about breaking into the tech industry: “Don’t play it safe. The tech industry is very unique with lots of opportunity for someone just starting their career. Take risks. Look for startups that can drive exponential change and not just ones that seem to be the 'coolest.'”

Read article

NSA spy details how to tap into webcam on Mac without user noticing

October 7, 2016

SC Magazine

"If these gadgets are not regularly updated to address vulnerabilities, then they are left open to exploitation," says Vectra EMEA Director Matt Walmsley. "There's now a lot of pressure on the manufacturers to raise their game and support the embedded software side of things as long and as vigorously as, say, a PC operating system vendor does.”

Read article

TalkTalk fined £400k by ICO for data breach

October 6, 2016

Comms Business

"Under the forthcoming EU General Data Protection Regulation (GDPR), the fines could have been much higher – up to 4 percent of worldwide turnover. In the case of TalkTalk, that could have been £72 million based on 2015 turnover,"Vectra CSO Günter Ollmann says. "In that respect, the company has got off lightly.”

Read article

A drop in the ocean: Industry pros react to TalkTalk data breach fine

October 6, 2016

ITProPortal

“Autonomous, behaviour-based threat monitoring can prevent a repeat of the same type of attack for any company, without requiring a major capital investment in more IT security staff,” Vectra CSO Günter Ollmann tells ITProPortal. "This new type of security approach allows known and unknown malware and attack vectors to be spotted.

Read article

Top nine cybercrimes of 2016

October 4, 2016

Federal Computer Week

Jonathan Barrett and Justin Heath from Vectra weigh in on the most serious cybercrimes of the past year. About the Shadow Brokers' hack of the NSA-affiliated Equation Group, Barrett notes that "the penetration of such a highly regarded organization demonstrates what serious security professionals already know: Everyone is vulnerable."

Read article

Release of Mirai IoT botnet malware highlights bad password security

October 4, 2016

SearchSecurity

The Mirai botnet malware used in the DDoS attack that took down the site of infosec journalist Brian Krebs was clocked at 620 Gbps. It was released in the Hackforums community website by Anna-senpai, who claims to have authored the code. Vectra CSO Günter Ollmann explains security concerns around Mirai and the dangers of default passwords.

Read article

Even in the tech industry, sticky tape remains a preferred security measure

October 3, 2016

Fast Company

The risk isn’t limited to traditional webcams, says Vectra CSO Günter Ollmann, whose company found vulnerabilities in an inexpensive networked camera earlier this year. Internet-enabled home security cameras and networked TVs can also be hacked. So can videoconferencing tools in offices, which can be used as a gateway into other office machines.

Read article

Druckertreiber – nützliches Tool für Hacker

September 30, 2016

Silicon

Mit Malware infizierte oder fingierte Druckertreiber stellen in Microsoft Windows eine kritische Sicherheitslücke für netzwerke dar. Das berichtet Gérard Bauer, vice president EMEA bei Vectra, auf Silicon.de. Bauer gibt Einblick in die Angriffstechnik von Cyber-Kriminellen und erklärt Lösungsansätze, mit denen sich Unternehmen schützen können.

Read article

Exploiting the firewall beachhead: A history of backdoors into critical infrastructure

September 30, 2016

IT Security Guru

Firewalls have rarely been a hindrance to breaching a network and siphoning data, according to IT Security Guru. Vectra CSO Günter Ollmann explores the history of the firewall over the last three decades and how vulnerable it is to targeted and persistent attacks by sophisticated adversaries, particularly through the use of backdoors.

Read article

Is Wall Street bad for cybersecurity?

September 27, 2016

The Christian Science Monitor

"I anticipate that now that the bridge has been crossed, other security researchers will attempt to work with similar investment companies to monetize the vulnerabilities and research they have conducted," said Günter Ollmann, chief security officer at the cybersecurity firm Vectra Networks.

Read article

25 emerging security vendors to watch

September 27, 2016

Dark Reading

InformationWeek and Dark Reading named Vectra one of 25 emerging security vendors to watch, citing its ability to provide "automated threat management to discover attackers inside corporate networks. It's powered by behavioral models that are always learning, and issue alerts about threats before they cause extensive damage."

Read article

Yahoo hack – industry reactions

September 23, 2016

IT Security Guru

Matt Walmsley, EMEA director at Vectra, comments on the Yahoo hack: “It’s concerning how many organisations are unaware of huge data breaches taking place in their networks. Research shows that about two out of 10 data breaches are detected internally – leaving around 80% to be detected by external discovery and third-party agencies.”

Read article

Yahoo to face 'serious questions' in UK

September 23, 2016

The Telegraph

"By calling it 'state sponsored' organisations, are attempting to deflect the discussion from the types of tools used and their failed defences, and to posit that they had no chance of protecting their data because 'the government did it'," said Günter Ollmann, chief security officer at Vectra Networks.

Read article

Hintertüren in datacenter firewalls – Einfallstor Rechenzentrum

September 22, 2016

Funkschau

Vectra Networks möchte mit einer neuen Lösung versteckte Sicherheitslücken in Netzwerkinfrastrukturen wie Firewalls, Server, Router und Switches aufdecken. Das berichtet das Fachmagazin Funkschau. Demnach ermöglicht diese Sicherheitslösung branchenweit erstmalig die erforderliche Transparenz, den Kontext und die Intelligenz, um selbst hochentwickelte Angriffe auf das Rechenzentrum aufzudecken.

Read article

Calling it 'critical infrastructure' won't protect the vote

September 21, 2016

The Christian Science Monitor

While U.S. officials have suggested designating election systems as critical infrastructure after the Democratic National Committee hack, 62% of Passcode Influencers say it's not enough. “Unless we move beyond a declaration and into actual protection, proclamation would act more like an invitation to global hackers," said Vectra CTO Günter Ollmann.

Read article

What to think about when moving to the cloud

September 19, 2016

CSO

Günter Ollmann, CSO at Vectra Networks, said, "Instead of buying hardware and appliances with a three-to-five-year depreciation lifecycle, they are buying a service. They are now paying, typically, based around number of servers or users being protected. Their security spend can change drastically in Capex and Opex."

Read article

Bringing cybersecurity to the data center

September 19, 2016

SecurityWeek

We need to recognize the uniqueness of the data center and the threats they face, while recognizing that this uniqueness does not make them separate. Look for the attack techniques that are unique to the data center, while retaining the context of everything we've learned in the campus. This requires some planning, but is achievable.

Read article

Advisors' account security may leave your money vulnerable

September 16, 2016

CNBC

The more places your information is stored and the more people have access to it, the more potential points of attack there are, said Vectra CEO Hitesh Sheth. Encrypted databases don't mean much if your financial advisor takes work home on an unencrypted thumb drive or an office assistant falls for a phishing email.

Read article

Cybersecurity predictions for 2016: How are they doing?

September 15, 2016

ZDNet

Vectra's prediction that 2016 would see ransomware "focus more on holding enterprise assets hostage and less on individuals," is supported by a recent report that shows nearly 40% of businesses surveyed experienced a ransomware attack in the last year. Over a third lost revenue and 20% had to completely cease business operations.

Read article

Verhaltensanalyse zur Abwehr von Angriffen auf das RZ

September 14, 2016

LANline

Vectra Networks bietet nun auch Rechenzentren einen umfassenden Schutz vor Hackerangriffen. Das berichtet das Fachmagazin LANline.

Read article

Vectra extends its threat management into the data center

September 14, 2016

SDxCentral

Vectra, which has been focusing on campus networks, is expanding its reach to the data center and the public cloud. The company is among a new wave of security companies that detect attacks in progress. Vectra's new strategies detect bad behavior because intruders in the data center don’t have the same goals as intruders in the campus network do.

Read article

NOPEN is the Equation Group's backdoor for Unix systems

September 13, 2016

Softpedia

Security experts from Vectra Networks have taken a closer look at one of the files leaked by the Shadow Brokers, a nefarious group that claims to have stolen hacking tools from the Equation Group, a US-based cyber-espionage actor that some security vendors say is the NSA.

Read article

Are our data centres insecure?

September 13, 2016

SC Magazine

A challenge facing virtualised data centres is securing the physical infrastructure on which the virtual or shared service sits. The point of attack is the area outside of the hypervisor and virtual machines, utilising support and management protocols such as IPMI. It is the physical infrastructure – the servers, switches and firewalls – that is being targeted.

Read article

Wipro allies with specialists to combat cyber threats

September 13, 2016

CXOtoday

India’s third largest IT services firm has recently partnered with Silicon Valley-based cyber security firm Vectra Networks and Israel-based IntSights Cyber Intelligence to bolster and expand its threat intelligence-as-a-service offering.

Read article

Thinking your way to safety

August 31, 2016

Computing Security

Does behavioural analytics fit into the concept of machine learning? Vectra EMEA Director Matt Walmsley comments, "Behavioural analytics is a powerful component in machine learning, based on real-time threat detection and management. By focusing on behaviours rather than signatures, it's possible for previously unknown threats to be identified."

Read article

Vectra encourages partners to be MSPs with technology program

August 18, 2016

CRN

Matt Walmsley, EMEA director at Vectra, says “channel partners are looking to augment and build out multi-layered offerings and service delivery capabilities as they transform their business as traditional resellers to being very services led. That's why we've gone out and created technology alliances."

Read article

Firmware, controllers and BIOS: Subterranean malware blues

August 16, 2016

SecurityWeek

With all the effort expended on securing virtualized environments, one of the biggest vulnerabilities is in hardware, says Wade Williamson, Vectra director of threat analytics. This is true not just in the data center, but in our laptops. The underlying firmware, controllers, and BIOS can undercut what we think we know about a device.

Read article

The debate over encryption backdoors

August 15, 2016

Infosecurity

Months on from Apple and the FBI headlines, the security industry has had a chance to reflect on the lessons learned about backdoors in products – whether deliberate or put there without all parties knowing. Vectra CSO Günter Ollmann looks at the case for encryption in the second half of 2016.

Read article

Seven reasons why the Sage data breach should come as no surprise

August 15, 2016

Computer Business Review

Matt Walmsley, EMEA director at Vectra, comments on the Sage breach, “The simplest way to access unauthorised systems is through the acquisition and misuse of legitimate credentials. Other 'insiders' may seek to escalate their privileges or broaden the hosts and services they wish to access for nefarious reasons."

Read article

Unwanted guests: Hackers breach HEI Hotels & Resorts' POS terminals

August 15, 2016

SC Magazine

Following a data breach at HEI Hotels & Resorts, Vectra CSO Günter Ollmann explains why the hospitality industry continues to serve as a target of attack. Because the hospitality industry “depends heavily on transient and temporary staff, they are more prone to physical subversion of their systems.”

Read article

AI in cyber-security: Creating the best defence against modern cyber attacks

August 12, 2016

Computer Business Review

Oliver Tavakoli, CTO at Vectra Networks, told CBR: “Most leading edge cyber security solutions would more accurately be described as employing ‘data science’ and ‘machine learning’ than ‘AI’.

Read article

Günter Ollmann on the future of ransomware, exploit kits and IoT

August 5, 2016

Threatpost

Günter Ollmann, CSO at Vectra networks, talks to Mike Mimoso at Black Hat about ransomware as a prototype for malware going forward, as well as the long-term future of exploit kits and whether IoT is something that can be secured sooner rather than later.

Read article

Black Hat 2016 round-up: Jeep Cherokee hacked again and Olympic cyber threats

August 5, 2016

Computer Business Review

Accolades: Vectra was given the ‘Most Innovative Emerging Company’ for its tool allowing security teams to prioritise threats at their organisations.

Read article

Five Channel Ops: Sophos at Black Hat, pen testing musts, new datto data centers

August 5, 2016

Channel Partners

Here’s one more: Vectra Networks, winner of the Best-of-Black Hat award for most innovative emerging company. Vectra’s technology uses machine learning and behavioral analysis to spot threats in network traffic in real time, and it has a comprehensive channel program.

Read article

Dark Reading names Vectra the Best of Black Hat Most Innovative Emerging Company

August 3, 2016

Dark Reading

Dark Reading selected Vectra for addressing security challenges with solutions that are inventive and practical. "With a glance at the simple, elegant visualization used by Vectra’s Threat Certainty Index, an infosec pro will know in moments what needs their attention first,” notes Editor-in-Chief Tim Wilson.

Read article

AI in cyber-security: Are we trying to run before we can crawl?

August 2, 2016

SC Magazine

Vectra CTO Oliver Tavakoli said it best: “We need to use machine learning where it makes sense – when we analyze advanced of attacks, correlate behavior and conduct data reduction. When we call it AI, we're constructing a narrative that is often used by marketing to build buzz. The term is one of pop culture rather than an actual scientific term.”

Read article

Solar panels, vacation Wi-Fi at risk for hacking

August 1, 2016

USA Today

“The bad guys communicate really, really well," says Vectra CSO Günter Ollmann. "They have an entire ecosystem for sharing and monetizing techniques. Our corporate security community doesn't have those tools, but we have Black Hat and DefCon and BSides."

Read article

LastPass security flaws put passwords at risk, patch rolling out

July 27, 2016

SearchSecurity

Vectra CSO Günter Ollmann, Vectra CTO Oliver Tavakoli and security researcher Lane Thames at the Tripwire Vulnerability and Exposures Research Team agreed that the vulnerability should not have been discussed on Twitter, but Tavakoli thought the security flaws were nonetheless disclosed responsibly.

Read article

Time to update how we manage and address malware infections

July 25, 2016

IT Security Guru

As advances in network-based detection increase the fidelity and coverage of malware and threats, the possibility of specific attribution will continue to recede, says Mike Banic, vice president of marketing at Vectra. The malware ecosystem continues to evolve swiftly, and security researchers and professionals need to adapt accordingly.

Read article

July 2016: A perfect vulnerability storm

July 25, 2016

SecurityWeek

July was the busiest month in recent memory for vulnerabilities, says Wade Williamson, Vectra director of threat analytics. The vulns were copious and severe, and all the big vendors seemed to suffer. And while every organization strives to keep their technology patched and updated, months like this remind us that it is impossible to be perfect.

Read article

How predictive analytics discovers a data breach before it happens

July 25, 2016

TechCrunch

We have to consider that the tools and tactics of our adversaries will evolve and change in parallel with ours, warns Oliver Tavakoli, CTO at cybersecurity firm Vectra Networks. “After several years spent trying to perfect predictive analytics, attackers will counter with feints and pattern randomization."

Read article

Ten emerging security vendors you should know about

July 25, 2016

CRN

CRN named Vectra Networks to its prestigious list of 2016 Emerging Vendors. Vectra was singled out by CRN as a rising technology innovator who is reshaping the future of the IT channel. The CRN Emerging Vendors list is a valuable resource for solution providers looking to expand their portfolios with cutting-edge technology.

Read article

Cyber security basics: Four best practices for stopping the insider threat

July 20, 2016

Computer Business Review

Whether external and insider, detecting threats requires identifying when hosts behave in a way that exposes data or assets. “There is a need to track the flow of data within a network to proactively identify the acquisition, staging, and stealing of data, whether driven by an insider or outsider,” says Matt Walmsley, EMEA director at Vectra.

Read article

Microsoft rolls out a patch to fix a 20-year-old security flaw; but is it really effective?

July 15, 2016

University Herald News

The security flaw enabled malicious users to covertly install a hand-picked malware on computers that connect to fake printers or devices that pose as printers. Vectra Networks security experts found that the issue dwells in the Windows Print Spooler component that connects to available printers.

Read article

Sicherheitslücke in Windows ermöglicht Malware-Ausbreitung via Netzwerkdrucker

July 14, 2016

Datensicherheit.de

Die Forscher des Sicherheitsexperten Vectra Networks haben ein kritisches Sicherheitsleck in Microsoft Windows entdeckt. Dieses ermöglicht Hackern, mit relativ einfachen Mitteln, Computer innerhalb eines Netzwerkes automatisch mit Schadsoftware zu infizieren, sobald sich diese mit einem Drucker verbinden.

Read article

Kritische Windows-Lücke: Drucker können Malware einschleusen

July 14, 2016

ZDNet

Vectra Networks hat seine jüngsten Ergebnisse des Vectra Threat Labs veröffentlicht. Das berichtet das Online IT- und Business Magazin ZDNet. Die Experten der Forschungseinrichtung haben eine kritische Sicherheitslücke bei Microsoft Windows entdeckt, die es Hackern mithilfe von infizierten oder fingierten Druckertreibern ermöglicht, die Systemkontrolle über Computer innerhalb eines Netzwerks zu erlangen.

Read article

Kritische Sicherheitslücke in Windows

July 14, 2016

IT Administrator

Gravierende Sicherheitslücke in Microsoft Windows: Die IT-Sicherheitsexperten von Vectra Networks haben ein Sicherheitsleck entdeckt, das alle Microsoft Windows Anwender betrifft, die einen Drucker nutzen. Dieses ermöglicht Hackern, mit relativ einfachen Mitteln, Computer innerhalb eines Netzwerkes automatisch mit Schadsoftware zu infizieren, sobald sich diese mit einem Drucker verbinden.

Read article

Windows warning: This 20-year-old glitch could leave you vulnerable to malware

July 14, 2016

Daily Express

Researchers at Vectra Networks have unearthed a 20-year-old flaw in Windows Print Spooler, used to oversee the printing process from Microsoft desktop and laptop machines, that leaves machines open to attackers. According to Vectra Networks, the Print Spooler does not check whether a printer's drivers are legitimate as you plug in the hardware.

Read article

Hackers can take over your PC through your printer

July 14, 2016

ITProPortal

“This research underscores the many possibilities that IoT devices, like printers, present to attackers,” said Vectra CSO Günter Ollmann. “Such devices are rarely assessed for security flaws, backdoors, or as watering hole threats, and represent a growing blind spot for both corporate and home networks.”

Read article

A 20-year-old Windows security weak spot has just been patched

July 14, 2016

Alphr

Whenever software is updated, security experts are usually pretty quick to spot flaws that could lead to malware infections, aided by various bug bounties and the like. Some potential flaws however slip through the net for days, weeks, months, years and - very rarely - decades. Vectra Networks has found one such flaw that dates back around 20 years.

Read article

Ancient Windows printer flaw exposes you to malware

July 14, 2016

IT Security Guru

Researchers at Vectra Networks have discovered a roughly 20-year-old flaw in Windows Print Spooler (which oversees the printing process) that lets attackers slip malware on to a PC. As the spooler doesn’t verify that a printer’s drivers are legitimate when you plug the hardware in, it’s possible for attackers to install maliciously-coded drivers thorough either the internet or the printer itself.

Read article

Ready to print? Here's malware instead

July 14, 2016

infoRisk Today

"Microsoft is pretty much between a rock and a hard place," Nicolas Beauchesne, senior security researcher with Vectra, says. "Printer vendors have yet to agree on a printing standard or in some cases, to even sign their drivers. Ensuring that every driver is signed would break older printers until their respective vendors deploy new drivers for all their models."

Read article

Hunting the snark with machine learning, artificial intelligence and cognitive computing

July 14, 2016

SecurityWeek

Vectra CSO Günter Ollmann explains that the unsupervised learning element comes from first baselining the network’s usual behavior. The system then monitors for any abnormal behavior on the network. It can be aided, he added, with "hints," or manually labeled events – but basically it works on its own.

Read article

Forbes hottest cybersecurity startups of 2015

December 29, 2015

Forbes

In 2015, there were few hotter areas in Silicon Valley than cybersecurity, and Vectra ranked in the top 10 of that competitive group.

Read article

Uncovering covert attack communications inside your network

December 24, 2015

InfoSecurity

Cyber attackers are slipping through perimeter defenses and hiding in the shadows and dark corners of networks.

Read article

Hello Kitty fixes website security flaw

December 23, 2015

Cloud Pro

Sanrio says the loophole that provided an attack entry method potentially allowing cyber criminals to bypass traditional security defences in order to enter and exploit internal systems with the appearance of a legitimate user, has been closed and data is now safe.

Read article

Algorithms are the key to detecting and mitigating cyber attacks

December 23, 2015

Security News Desk

Gerard Bauer, vice president of EMEA sales at Vectra, shares his security predictions for 2016.

Read article

Automated threat detection helps fulfill protection goals of critical security controls

December 22, 2015

Homeland Security Today

New technologies, such as machine learning, have evolved to help organizations improve their response to modern attacks. Although the financial industry has been using machine learning since the 1970s to detect fraudulent behavior, use of machine learning in the information security sector is a recent phenomenon.

Read article

Cybersecurity in virtual networks

December 18, 2015

VMblog.com

In this eighth annual VMblog.com series exclusive, virtualization and cloud executives share their predictions for 2016.

Read article

Protecting the university network and flagging attacks — in real time

December 15, 2015

Education Dive

Higher education is a key target for cyber attacks because of the open networks common on college and university campuses. Thousands of students and faculty wander on and off the network with their own devices, bringing viruses and malware to the wider community and creating nightmares for security teams.

Read article

SANS Institute shows true power of automated threat detection

December 14, 2015

Cloud Security Resource

A SANS Institute report, backed with findings from Vectra, explains how an automated threat detection system that combines behavioral analysis, data science and machine learning can help organizations meet Critical Security Control (CSC) mandates.

Read article

The state of cybersecurity: What 2016 will bring

December 14, 2015

ITProPortal

In 2016, what organisations need are tools that identify the activities of the attacker inside a network before a data breach occurs, with a focus on how to quickly intervene, minimise the time they are exposed and reduce the impact of cyberthreats.

Read article

How one university addresses targeted attacks in progress

December 14, 2015

University Business

Hernan Londono, associate CIO at Barry University in Miami, talks about embracing campus mobility and BYOD, and explains why a strong Advanced Persistent Threat (APT) defense is vital to protecting the university's network from mobile devices that it doesn't own or manage.

Read article

Data science, machine learning and behavioral analysis help identify new security threats

December 8, 2015

Campus Technology

Automated network threat detection tools that use data science, machine learning and behavioral analysis work with perimeter security to help organizations meet security goals defined in the CIS Critical Security Controls recommendations and protect against attackers, according to a new report from the SANS Institute.

Read article

Fleeting strategic importance? 2016, the year of the CISO

December 7, 2015

IDG Connect

The core view of most of the experts we spoke to was that, while it is not clear if there is a higher number of CISOs now, these individuals are definitely gaining a stronger position within the business.

Read article

Detecting and preventing cyberattacks in your network

December 7, 2015

University Business

Despite being vulnerable to cyberattacks, many universities still have insufficient threat management defenses. Attackers can easily evade perimeter security defenses and spy, spread and steal for the better part of a year, undetected. In the process, they'll take vital research data, personal info and financial records from campus community members.

Read article

Nothing's sacred: VTech hackers stole kids photos and chat histories

December 1, 2015

SC Magazine

VTech hackers purportedly made off with millions of pieces of customer information and have now been revealed to have stolen photos and private chat histories, too. VTech sold an app called Kid Connect that lets parents use their smartphones to talk to their kids through their VTech devices.

Read article

The exploitation game

November 30, 2015

Computing Security

What steps can be taken to detect and block exploits that take advantage of software vulnerabilities? And how can security teams better understand the behaviour of legitimate software components? Preventing the exploitation of software vulnerabilities is desirable but their detection is a must for organisations and their security teams.

Read article

Detecting and preventing cyberattacks in your network

November 30, 2015

University Business

Officials from Vectra Networks and Barry University in Miami discuss insufficient cyber attack defenses at many colleges, despite existing vulnerabilities. They also discuss new defense-in-depth models that quickly pinpoint and mitigate threats in progress and share security strategies that enable mobility as well as open and collaborative learning.

Read article

Why ransomware is not going away any time soon

November 30, 2015

SecurityWeek

Ransomware is targeting enterprise networks with a vengeance. In addition to user hard drives, it's been increasingly successful at encrypting file-shares and network drives. Consequently, ransomware has evolved from a mere nuisance to a potentially debilitating attack that holds critical business assets and intellectual property hostage.

Read article

VTech Holdings: Data from 5 million customer accounts breached

November 30, 2015

Wall Street Journal

VTech, maker of electronic toys for kids, said that 5 million of its customer accounts were leaked in a data breach that accessed user names, birthdays and passwords but not their credit card or personally identifiable information. Company officials noted that the breach was mounted by an "unauthorized party."

Read article

Vectra wins 2015 Computer Technology Review Most Valuable Product award

November 24, 2015

Computer Technology Review

Vectra advanced persistent threat (APT) security software was chosen by the Computer Technology Review editorial panel based on rigorous judging criteria that included product innovation, functionality and affordability.

Read article

No signatures required

November 21, 2015

ITProPortal

However, the most dangerous threat to data, user and system security is not the known known, but rather the unknown unknowns – the threats that have yet to be captured in the wild and mapped. We don’t know if they exist, we don’t have visibility into what they do, and there’s no way signatures can catch them.

Read article

GSN announces winners and finalists in 2015 Homeland Security Awards

November 17, 2015

Government Security News

Government Security News is pleased to announce that Vectra has been named a finalist in its seventh annual Homeland Security Awards for Best Threat Intelligence Solution.

Read article

The Internet of Things is making oil production vulnerable to hacking

November 17, 2015

Motherboard

The oil and gas industry is caught in a slump, with prices going up and down and profits in decline. But it faces another major problem that's gotten less attention: Cyber attacks could threaten industry stability and worker safety.

Read article

A look at real risks to school networks, with a level-headed security approach

November 16, 2015

EdTech Digest

Unlike vendors that attempt to make every piece of malware sound like the end of the world, it is important to show IT security teams which threats actually pose the greatest risks to the university.

Read article

Vectra helps organizations identify intruders that are already in their networks

November 16, 2015

infoTECH Spotlight

Most security solutions have one at-bat, yet attackers can typically survive undetected in a network for around 225 days, says Vectra’s Mike Banic. “Every network has likely been hacked, but they just don’t know it yet,” he says.

Read article

Video: Top Vectra executive talks about cyber security with TMCnet editors

November 14, 2015

TMCnet

Vice president of marketing Mike Banic shares the company's latest developments and discusses its recent advancements in the real-time detection of in-progress cyber attacks that spread inside networks.

Read article

Branch offices are more than a remote risk to network security

November 13, 2015

Computer Technology Review

While remote offices, clinics, bank branches and retail locations are critical to business success, they often lack the same security protections found at the headquarters or data center locations.

Read article

Vectra is among 16 technology innovators at SINET

November 13, 2015

Ulitzer

The capstone event of SINET is its yearly innovation showcase in Washington, D.C., the last of which was held Nov. 3-4. The showcase brought together innovative solutions from 16 firms, including Vectra, selected by a collective of seasoned judges.

Read article

Can we protect data without prying?

November 11, 2015

InfoSecurity

Are cybersecurity and privacy mutually exclusive, or is it possible to have both? Oliver Tavakoli, CTO of Vectra Networks, offers a quick analysis of the commercial solutions available from well-known cybersecurity suppliers to provide valuable insight.

Read article

Cybersecurity students learn by hacking at RIT Collegiate Pentesting Competition

November 11, 2015

RIT University News

Rochester Institute of Technology is already planning its second Collegiate Pentesting Competition after the success of its first annual event held Nov. 7–8 in Rochester, N.Y. Teams from nine regional universities faced-off at RIT as they broke into computer networks, evaluated their weak points and presented plans to better secure them.

Read article

Vectra sponsors collegiate competition to battle cyber threats

November 3, 2015

PRWeb

A new competition at Rochester Institute of Technology allows students to attack the problem of cyber security from a different perspective. Instead of defending themselves against attackers, as other cyber threat competitions do, these students create a full-fledged plan of attack and launch it against a network.

Read article

TalkTalk reveals extent of data hack, second teen arrested

October 30, 2015

Energy & Technology Magazine

Two teens arrested after being implicated in the attack on internet service provider TalkTalk in which 1.2 million customer details were stolen last week.

Read article

Putting on the cyber shift: How to adapt to advanced strategies

October 28, 2015

infoTECH Spotlight

Cyber attackers are moving laterally inside networks and using hidden tunnels of encrypted traffic to get around. The encrypted traffic that protects data within modern applications – such as SharePoint, Exchange, Salesforce.com, and Google Apps – creates a blind spot that can be exploited by advanced threats and malware.

Read article

Breach analytics: The next billion-dollar investment opportunity

October 24, 2015

VentureBeat

Vectra takes the network analytics approach, proposing to weave together data via machine learning to surface anomalous behaviors and even anticipate an attacker’s next move.

Read article

TalkTalk receives ransom demand following website hack

October 23, 2015

Wall Street Journal

TalkTalk Telecom Group PLC said Friday it has received a ransom demand from someone claiming responsibility for a criminal hack of its website that could have resulted in the theft of data from its database.

Read article

Expert comment: TalkTalk cyber breach

October 23, 2015

IDG Connect

For the third time, UK telecoms provider TalkTalk has fallen victim to a cyber-breach and there could be as many as four million customers affected.

Read article

Cyber security experts react to TalkTalk breach

October 23, 2015

Threat Intelligence Times

In the wake of news that TalkTalk have suffered their third serious data breach in a year, industry experts have lined up to express concern at the company’s blasé attitude toward cyber security.

Read article

Oil and gas industry must face the challenges of cyber safety

October 18, 2015

Houston Chronicle

Cyber threats to the oil and gas industry infrastructure are potentially more serious than the breaches where hackers capitalize on stolen personal, health care or financial information. Nation states and foreign businesses have motivations to carry out cyber attacks with potentially crippling global consequences.

Read article

Vectra Networks comments on Dridex malware threat

October 14, 2015

Security News Desk

The National Crime Agency has issued a warning that a new version of the Dridex malware is targeting the UK, with £20 million having already been purported stolen by this attack.

Read article

EC3 in cooperative action to target Dridex banking malware

October 14, 2015

SC Magazine

EC3, NCA, FBI and a range of other bodies have targeted the Dridex banking malware, including using a sinkhole operation to sever communications between infected botnets and their controlling cyber-criminals.

Read article

Barry University gets smart about cyber security

October 14, 2015

Baseline

The university turns to Vectra for a real-time cyber-attack detection system that uses data science, machine learning and behavioral analysis to detect attacks in progress.

Read article

Taking stock: Ranking the next bllion-dollar cybersecurity markets

October 14, 2015

RSA Conference

Venky Ganesan, managing director at Menlo Ventures, writes, “I believe there will be significant winners…notably those that reduce false positives and prioritize workflows for better incident response and remediation. Among the early leaders are companies such as Exabeam, LightCyber, Securonix and Vectra Networks."

Read article

Adobe patches many flaws in Flash Player, Acrobat, Reader

October 13, 2015

SecurityWeek

Updates released on Tuesday by Adobe for Flash Player, Reader and Acrobat address a significant number of vulnerabilities that expose the users of these products to hacker attacks. The work of experts from Vectra Networks has been acknowledged in finding and reporting vulnerabilities.

Read article

Jackson Health System to present cyber attack prevention at ITxpo

October 2, 2015

mHealth Times

Vectra customer Jackson Health System will speak at the Gartner Symposium/ITxpo 2015 event next week. Jackson Health System CISO Connie Barrera will present “Protecting Health Organizations from Cyber Attacks” on Oct. 6 at 3:50 p.m. EDT in the Europe 8 Conference Room of the Walt Disney World Dolphin hotel in Orlando, Florida.

Read article

SINET names Vectra a top cybersecurity innovator

October 1, 2015

Business Wire

SINET, an organization focused on advancing cybersecurity innovation through public and private sector collaboration, today announced the winners of its annual SINET 16 Innovator competition, including Vectra Networks.

Read article

Vectra raises $35 million in sizzling cyber security investment market

September 30, 2015

Silicon Valley Business Journal

Vectra Networks raised $35 million in equity funding on Tuesday. DAG Ventures led the round with participation from all existing investors including Khosla Ventures, Accel Ventures, IA Ventures, AME Cloud Ventures, Intel Capital and Juniper Networks.

Read article

The unintended attack surface of the Internet of things

September 29, 2015

Dark Reading

While consumer Wi-Fi products may seem like an odd choice for intensive threat research, Vectra Threat Labs found that vulnerabilities in consumer and Internet of Things gear can end up having a much larger impact on enterprise security than you might think.

Read article

Value-added distributor Cloud Distribution teams up with Vectra in the UK

September 29, 2015

Channel Pro

Distributor Cloud Distribution has reached an agreement with Vectra Networks to provide the vendor’s security products to the channel. Cloud Distribution says it will help grow the Silicon Valley firm’s presence in the UK and forge relationships with new partners to drive revenue growth.

Read article

Vectra signs Cloud Distribution as a value-added distributor in the UK

September 29, 2015

CRN

Cloud Distribution has inked a deal with cybersecurity vendor Vectra Networks as the US player launches in the UK.

Read article

Barry University adopts anti-cyber attack measures

September 29, 2015

Campus Technology

Barry University, a 9,000-student Catholic university in Miami, has signed Vectra Networks to protect its data and networks from cyber attacks.

Read article

Barry University stops cyber attack in progress with Vectra

September 29, 2015

CIO Today

Barry University has selected Vectra to protect its high-value data Relevant Products/Services as advanced persistent attacks (APTs) surge. Vectra’s automated threat management solution enables the university to detect cyber attacks as they are happening – automatically and in real time.

Read article

Herding unicorns: Managing the asymmetric struggle of IT security

September 28, 2015

SecurityWeek

IT security is renowned for being in a state of constant evolution. New threats and attack strategies pop up constantly, and security vendors offer up shiny new products designed to keep the attackers at bay.

Read article

Vectra Networks expands into EMEA after accelerated growth

September 23, 2015

Channel Biz

Vectra Networks has completed its initial European business expansion following 12 months of “accelerated sales growth.” Vectra has established a dedicated European presence, with a local headquarters based in Pfaffikon, Switzerland, a logistics hub in Amsterdam and a dedicated European leadership team.

Read article

Das IT-Sicherheitsgesetz unter die Lupe genommen

September 21, 2015

IT-ZOOM

Die Sicherheit von Unternehmen sowie der Schutz der Bürger im Internet sollen verbessert werden – so sieht es das jüngst verabschiedete IT-Sicherheitsgesetz vor. Ziel ist es, die digitalen Infrastrukturen Deutschlands zu den sichersten der Welt zu machen.

Read article

Protecting the mobile football

September 16, 2015

SC Magazine

The world of security is like a football game, says Steven J. Spano, president of the Center for Internet Security. “There’s a flow to a football game where the defense has the advantage for a while, but then the offense starts to counter and mitigate,” he says.

Read article

Video: Are the economic consequences of cyber attacks severe enough?

September 15, 2015

CNBC Worldwide Exchange

Hitesh Sheth, president and CEO of Vectra Networks, says advanced economies now have cyber as part of their arsenal, and economic impacts are key during breaches.

Read article

Automated threat management: No signature required

September 15, 2015

[IN]SECURE Magazine

The industry approach to detecting threats is inherently reactive, ceding the firstmover advantage to the cyber criminals. Defenses – based on signatures, reputation lists and blacklists – are only designed to recognize threats that have been previously seen. This means someone needs to be the first victim, and everyone hopes it’s not them.

Read article

Data breaches by the numbers

August 31, 2015

SecurityWeek

Data breaches are constantly in the news whether in the form of sensational attacks against the likes of Ashley Madison or potentially more serious and far-reaching attacks such as those against health insurer Anthem or the U.S. Office of Personnel Management.

Read article

Cyber defenders 'boot camp' prepares students for mission-critical roles in wake of OPM breach

August 24, 2015

Lawrence Livermore National Labs

Against the backdrop of the U.S. Office of Personnel Management breach, the 2015 edition of the Laboratory’s Cyber Defenders internship offers an especially compelling introduction to cybersecurity for students who may soon serve on the front lines of cyberdefense.

Read article

A CISO's strategy for fighting phishing attacks

August 24, 2015

Healthcare Info Security

Hacker attacks often start with spear-phishing attempts used to obtain credentials or deliver malware. But healthcare entities can take steps to help prevent these scams from being successful, says Connie Barrera, CISO of Jackson Health System in Miami.

Read article

Threat intelligence needs to grow up

August 13, 2015

CSO

Security teams are overwhelmed with a massive amount of threat data. While a decade ago no one was talking about threat intelligence except government agencies, organizations are now bombarded with threat data leaving them challenged with identifying what is relevant.

Read article

Angler EK exploits recently patched Internet Explorer bug to deliver ransomware

August 11, 2015

Help Net Security

If they haven't already, Internet Explorer users would do well to implement the security update provided by Microsoft last month, as among the fixed vulnerability is one that is currently being exploited via the popular commercial Angler exploit kit.

Read article

Recently patched Internet Explorer flaw added to Angler exploit kit

August 11, 2015

SecurityWeek

The Jscript9 memory corruption vulnerability (CVE-2015-2419) affecting Internet Explorer 11 was identified by Vectra Threat Labs while analyzing files leaked as a result of the data breach at Italian surveillance software maker Hacking Team. The flaw was identified from an email in which someone offered to sell the exploit to the Hacking Team.

Read article

Q&A with Black Hat and DEF CON founder Jeff Moss

August 3, 2015

eWeek

In-demand consultant and former hacker Jeff Moss offers his takes on trends, privacy, machine learning – and why you should always keep your keys in your pocket.

Read article

Addressing cybersecurity and the insider threat

August 1, 2015

Security Magazine

In the wake of massive data breaches at the U.S. Office of Personnel Management, health insurer Anthem and retailer Target, an enterprise’s initial reaction might be to tighten the security around networks and data. However, you may be forgetting one critical component: The insider threat.

Read article

Der Bundestag-Hack und die Folgen

July 29, 2015

Computerwoche

Hacker installieren Schadsoftware auf Computern des Bundestages sowie des Kanzleramts und greifen über Monate hinweg sensible Daten ab, ohne bemerkt zu werden. Welche Bedrohungen existieren für deutsche Unternehmen und Verbraucher? Und wie kann man sich schützen, wenn überhaupt?

Read article

Automated threat management: No signature required

July 28, 2015

Help Net Security

The industry approach to detecting threats is inherently reactive, ceding the first-mover advantage to the cyber criminals. Defenses – based on signatures, reputation lists and blacklists – are only designed to recognize threats that have been previously seen. This means someone needs to be the first victim, and everyone hopes it’s not them.

Read article

Vectra is recognized by CRN as a 2015 Emerging Vendor

July 22, 2015

CRN

Vectra earns spot on select list featuring coolest tech startups heating up the IT channel for equipping partners with differentiated automated threat detection offering.

Read article

Hacking Team leak reveals zero-day Internet Explorer 11 bug

July 17, 2015

V3.co.uk

Security company Vectra Networks has detected a zero-day vulnerability affecting Microsoft's Internet Explorer (IE) 11, after scanning through the huge cache of data logs leaked from Hacking Team.

Read article

Video: Tavis Smiley and Vectra CTO discuss recent cyber attacks

July 17, 2015

PBS; Tavis Smiley

Oliver Tavakoli sheds light on how the public can keep information safe in today’s Internet-driven world.

Read article

Adobe, Microsoft and Oracle patch for Hacking Team flaws

July 16, 2015

eWeek

Zero-days patched across major vendors expand the fallout from the Hacking Team breach, but that's not the only source of vulnerability disclosures this month.

Read article

Another Hacking Team zero-day surfaces, this time in Internet Explorer

July 15, 2015

Naked Security

According to security researchers at Vectra Networks, this latest vulnerability in Internet Explorer was patched in amongst Microsoft's latest Update Tuesday fixes, which came out on 14 July 2015.

Read article

Hacking Team dump: Windows zero-day, Microsoft patches flaw pitched to spyware vendor

July 15, 2015

Data Breach Today

Vectra says it notified Microsoft about the flaw on July 9, then waited to release details of the flaw until a Windows fix had been released, just five days later. "They were able to work on this very quickly," says threat researcher Wade Williamson, director of product marketing at Vectra.

Read article

Microsoft kills two security bugs

July 15, 2015

WinBeta

Vectra Networks discovered a security flaw in the latest version of Internet Explorer 11 on Windows 7 and Windows 8.1 devices through monitoring an online conversation between a security researcher and malware developer Hacker Team regarding the sale of information relating to the flaw.

Read article

Who did DOD CIO Terry Halvorsen visit in Silicon Valley?

July 15, 2015

Washington Technology

Defense Department CIO Terry Halvorsen’s visit to Silicon Valley in April included 29 companies, including Vectra Networks, with a focus on security, big data analytics and infrastructure management.

Read article

The old way of stopping cyber attacks is no longer working

July 15, 2015

eSchool News

Firewalls alone may not be enough to stop cyber attacks. For that, there’s data science.

Read article

July 2015 Patch Tuesday: Microsoft and Adobe attack Hacking Team zero-days

July 14, 2015

TechTarget

Vectra Networks reported the vulnerability to Microsoft on July 9. Vectra said the flaw occurs within a custom heap in JSCRIPT9, meaning it may allow an attacker to bypass protections found in standard memory.

Read article

Microsoft patches Hacking Team Windows kernel zero-day

July 14, 2015

Threatpost

The Internet Explorer bulletin, MS15-065, patches 29 vulnerabilities in the browser, including a Jscript9 memory corruption bug.

Read article

Vectra discovers high-severity Internet Explorer 11 vulnerability following Hacking Team

July 14, 2015

Dark Reading

The Vectra Threat Labs found exploitable use-after-free vulnerability that lets attackers bypass standard memory protections in popular Web browser.

Read article

High-severity Internet Explorer 11 vulnerability identified after Hacking Team breach

July 14, 2015

Help Net Security

After analyzing the leaked data from last week's attack on Hacking Team, Vectra researchers discovered a previously unknown high severity vulnerability in Internet Explorer 11, which impacts a fully patched IE 11 web browser on both Windows 7 and Windows 8.1.

Read article

Microsoft patches Internet Explorer vulnerability offered to Hacking Team

July 14, 2015

CSO

According to Vectra Networks, the vulnerability fixed by Microsoft impacts fully patched versions of Internet Explorer 11 on both Windows 7 and Windows 8.1.

Read article

Microsoft patches Hacking Team zero-days, other vulnerabilities

July 14, 2015

SecurityWeek

Microsoft has released 14 bulletins as part of its July 2015 security updates. One of the zero-day vulnerabilities is a Jscript9 memory corruption vulnerability (CVE-2015-2419) identified by researchers at Vectra. The flaw affects Internet Explorer 11 and it can be exploited to gain complete control of a vulnerable system.

Read article

Microsoft kills critical Internet Explorer 11 bug after exploit was shopped to Hacking Team

July 14, 2015

Ars Technica

The IE vulnerability was discovered in an email a security researcher sent to Hacking Team executives, according to a blog post published Tuesday by researchers from security firm Vectra Networks.

Read article

Vectra Networks veut détecter les signaux faibles sur le réseau

July 9, 2015

LeMagIT

Vectra Networks n’es plus exactement ce que l’on appelle une jeune pousse. L’entreprise existe depuis quatre ans. Mais sa technologie a récemment été distinguée par l’Innovation Sandbox de la dernière édition de RSA Conference.

Read article

Video: Are most companies in the dark about hack attacks?

July 8, 2015

MSN

Vectra Networks CEO Hitesh Sheth discusses cyber-attacks, the importance of discovering breaches and the security of networks.

Read article

Report: Three percent of firms studied were victims of data theft

July 6, 2015

IT World Canada

Vectra Networks says metadata from 40 customer network it analyzed showed one or more indicators of a targeted (as opposed to opportunistic) attack in every company that bypassed any defence the organization threw up. Not only that, three per cent of the companies showed evidence of data theft.

Read article

The phases of a data breach: Finding the attack before the damage is done

July 6, 2015

Legaltech News

A new report from security firm Vectra looks at the strategic phases of a cyberattack and what companies can do to shore up their defenses.

Read article

Aadhaar, IRCTC and the NJAC Eminences

July 3, 2015

ComputerWorld India

Backed by a database that can be hacked into and changed, the NJAC may not really fix the perceived wrongs in the Supreme Court collegium system.

Read article

Vectra Networks kommt nach Europa

July 1, 2015

CRN

Für seinen Eintritt in den europäischen Markt hat der Sicherheitsanbieter Vectra Networks die DACH-Region gewählt. In dieser will er nun ein Partnernetzwerk aufbauen, das seine Threat Management-Lösung verkauft.

Read article

Report: Every company is compromised, but most infections not yet at critical stage

July 1, 2015

CSO

In a recent analysis of a quarter-million endpoint devices in 40 enterprises, every single corporate network showed evidence of a targeted intrusion but most of the activity was not yet at the most-dangerous data exfiltration stage.

Read article

Virtually every organization has been hacked

July 1, 2015

FierceCIO

There's no use in wondering anymore when your organization will be victimized by a cyberattack, it has already happened, to everyone. That is the take of an article at CIO, which noted that virtually every company has by now been compromised.

Read article

Das Angriffsverhalten auf IT-Infrastrukturen

June 29, 2015

Manage IT

Der zweite Post-Intrusion Report von Vectra Networks unter­sucht Bedro­hungen, die Schutz­maß­nahmen am Netzwerk­pe­ri­meter umgehen und zeigt auf, was Angreifer unter­nehmen, wenn sie im Netzwerk sind.

Read article

Targeted attacks on the rise; companies must be on the defensive

June 26, 2015

Website Magazine

Vectra Networks has announced the results of its second edition Post-Intrusion Report, which details threats to evade perimeter defenses and what attackers do once they get in a network.

Read article

Wall Street Journal survey roundup: Cyber scourge spreads

June 26, 2015

Wall Street Journal

A report from cyberdefense firm Vectra Networks found dramatic increases in lateral movements and reconnaissance are signs attackers are using targeted attacks to find ways past a company’s security perimeter.

Read article

Cybercriminalité: L'usage de Tor a explosé de 1,000%

June 25, 2015

Le Monde Informatique

Afin de mener leurs opérations de cybercrimes, les pirates sont de plus en plus nombreux à recourir aux réseaux Internet anonymes comme Tor. En 2015, son utilisation a bondi de 1 000% par rapport à l'année précédente selon un rapport de Vectra Networks.

Read article

Report finds evidence of surge in targeted cyberattacks

June 25, 2015

Homeland Security Today

In the wake of recent cyberattacks, including the high-profile breach of the U.S. Office of Personnel Management, a new report from Vectra Networks has found a massive surge in the number of targeted cyberattacks, calling into question whether organizations are prepared to meet this threat.

Read article

Malware getting smarter, stealthier once it breaches networks

June 25, 2015

CSO

Malicious actors are increasingly using the anonymous Tor network and external remote access tools to instigate targeted attacks that are growing in sophistication and complexity, a Vectra Networks analysis of internal traffic has shown.

Read article

Survey reports bad-boy behavior after the breach

June 25, 2015

IT-TNA

A new study from Vectra explains what happens after your cyber defenses have been breached. According to the second edition of its Post-Intrusion Report, there was non-linear growth in lateral movement (580%) and reconnaissance (270%) detections that outpaced the 97% increase in overall detections compared to last year.

Read article

Security specialists see cyber threats growing

June 24, 2015

eWeek

A new survey of 500 cyber security professionals shows privileged users, such as managers with access to sensitive information, pose the biggest insider threat to organizations (59 percent).

Read article

Les techniques d'intrusions de réseaux informatiques évoluent

June 24, 2015

ICTjournal

Selon un rapport de Vectra Networks, les cyberattaques ciblées sont en nette augmentation. L’usage de réseaux tels que Tor se généralise.

Read article

Security-Anbieter Vectra Networks sucht Channelpartner

June 23, 2015

Inside-Channels.ch

Vectra Networks, ein US-Anbieter von Threat-Management-Lösungen, will ab sofort auch auf dem europäischen Markt aktiv tätig werden, wie er heute mitteilt. Der Security-Spezialist startet dabei mit der DACH-Region und koordiniert diese Bemühungen von Zürich aus.

Read article

Data science and machine learning will fight cyber-attacks, says Vectra Networks: 2015 Tech Predictions

December 31, 2014

SiliconANGLE

Vectra VP of Marketing Mike Banic predicts data science and machine learning will become the focus of the fight on cyber-attacks, cyber security will get social, and new entrants will continue to disrupt the cyber security market.

Read article

Vectra X-series platform identifies threats in real-time

December 22, 2014

eWeek

Real-time cyber-attack detector Vectra Networks has introduced a real-time detection platform for insider and targeted threats.

Read article

New products of the week 12.22.2014

December 22, 2014

Network World

Our roundup of intriguing new products from companies such as Dell, CloudBerry and Vectra (See Slide 16).

Read article

Breach detection, Sony Entertainment and Vectra Networks

December 19, 2014

EMA Blogs

Working in information security for the past 20 years, I have seen a lot. Though there have been many multi-million dollar impact breaches, the recent Sony Pictures hack and subsequent data exposure and extortion is probably the most impactful to a company out of the previous breaches this year.

Read article

Vectra releases real-time threat detection platform to protect against targeted attacks

December 15, 2014

PCC Mobile Broadband

Vectra Networks has released an updated real-time detection platform – X-series platform – aimed for insider and targeted threats detection.

Read article

Put the insider threat in your sights

December 15, 2014

InfoTech

Regardless of how well we secure our assets from outside parties, we ultimately need to give access to our employees, contractors and partners in order for them to do their jobs. Misuse of this privileged access, whether through data theft or damage, is an unfortunate, yet inherent risk of doing business for most organizations.

Read article

Vectra launches real-time detection platform to curb insider threats

December 11, 2014

Homeland Security Today

Vectra Networks announced release of a real-time detection platform to protect organizations and government agencies from insider and target threats.

Read article

Vectra updates threat detection platform

December 10, 2014

SecurityWeek

The Vectra X-series platform is designed to detect sophisticated threats by using a combination of security research, data science and machine learning. According to the company, the product is capable of detecting attacks on all operating systems, applications and devices regardless of the method and location of the initial delivery.

Read article

Vectra launches real-time threat detection

December 10, 2014

The VAR Guy

Vectra Networks has released its updated X-series platform, the first real-time detection solution designed to discover insider and targeted threats. The new platform promises to help organizations gain instant visibility into potential threats by leveraging a combination of dynamic community threat analysis and real-time detection of cyberattacks.

Read article

Video: Tracking cyber threats from inside a company

December 10, 2014

Bloomberg TV's Taking Stock

CEO Hitesh Sheth tells Bloomberg TV's Pimm Fox how Community Threat Analysis dynamically creates a clear picture of typical network access through the entire corporate network, identifying anomalies and flagging unauthorized access to documents, data and intellectual property, making it an effective way of recognizing insider attacks.

Read article

Review: Vectra X-series prevents data breaches with AI

December 9, 2014

Enterprise Networking Planet

Frank Ohlhorst details how data breaches happen and what Vectra’s X-series security appliances can do to detect and prevent them.

Read article

An epic ride: A look back at the ever-changing information security industry

December 8, 2014

SC Magazine

“We've gone from an environment where people were essentially stationary with fixed computing assets to one where everything is porous and people are mobile and applications and data and information are all in the cloud,” says Hitesh Sheth, president and CEO for Vectra Networks.

Read article

Industry reactions to devastating Sony hack

December 5, 2014

SecurityWeek

The systems of entertainment giant Sony have been hacked once again, and although the full extent of the breach is not yet known, the incident will likely be added to the list of most damaging cyberattacks.

Read article

The inner workings of a targeted attack

December 1, 2014

TechRepublic

Vectra Networks' X-series of appliances combine advanced analytics with AI to identify threats in real time.

Read article

Vectra post-breach report reveals attacker habits

November 25, 2014

The VAR Guy

Ten percent of hosts experience at least one or more cyberattacks that bypass enterprise security perimeter defenses, according to a new study by security solution provider Vectra Networks.

Read article

NotCompatible mobile malware gets badder

November 21, 2014

LinuxInsider

The new "C" version of the NotCompatible malware that targets Android devices is very difficult to stop – but it's not that hard to avoid.

Read article

Targeted attacks cause damage in multiple ways

November 14, 2014

eWeek

Overall, 15 percent of hosts in the participating organizations experienced a targeted attack, according to a Vectra Networks report.

Read article

Survey roundup: False sense of security?

November 14, 2014

Wall Street Journal

A report by data security company Vectra Networks looks at how cybercriminals bypass perimeter defenses, andwhat they do inside a network once they have gained access.

Read article

Feedback Friday: Executives targeted in 'darkhotel' attacks

November 14, 2014

SecurityWeek

When it comes to the darkhotel issue and the fast-evolving threat landscape, "what the malware is doing" is more important than "what the malware is."

Read article

U.S. Postal Service employees, retirees, customers exposed in hack attack

November 11, 2014

Tech News World

There's speculation that China might be behind a months-long hack attack that breached USPS servers, compromising personal data of workers and customers.

Read article

What attackers do after bypassing perimeter defenses

November 6, 2014

Help Net Security

Vectra Networks collected data over five months from more than 100,000 hosts within sample organizations to gain a deeper understanding of breaches that inevitably bypass perimeter defenses, and what attackers do once inside networks.

Read article

Study: Organizations assailed by cyber attacks, 15 percent are targeted

November 6, 2014

SC Magazine

Highly organized, sophisticated and successful cyber attacks continue to assail organizations and while most are opportunistic, a higher than expected percentage are targeted, according to results from a recent study.

Read article

From malware to breach

November 6, 2014

Dark Reading

Got malware? More than likely you do, but don't panic: The bulk of infections can be traced to standard botnet activity like spamming and click-fraud rather than data theft, a new study of real-world breaches has found.

Read article

BYOD and other hazards

November 6, 2014

GARP

Mobile technologies can be a boon to productivity, but they also introduce cyber-security vulnerabilities that technologists and insurers are laboring to protect.

Read article

What attackers do after a breach

November 6, 2014

ISS Source

An attack happens and he or she is able to squeeze by the perimeter defense; that is just the beginning for an assault on a network, a new report shows.

Read article

Vectra report reveals what attackers do once they bypass perimeter defenses

November 5, 2014

InfoTech

This is the first report, using real-world data from the Vectra X-series platforms currently in production networks, that reveals what attackers do within a network once they evade perimeter defenses.

Read article

Some U.S. retailers shun Apple Pay, eye rival payments system

October 27, 2014

Reuters

Some large U.S. retailers are refusing to use Apple Inc's new electronic payments service as they commit to developing a rival payments system that would bolster their profits by eliminating credit card transaction fees.

Read article

Computer Technology Review Top 25 must-have software apps

October 27, 2014

Computer Technology Review

Every year Computer Technology Review ranks the top 25 software applications that you absolutely must check out. This year, new-comer Vectra Networks is in the mix.

Read article

Cyber security goes mobile

October 20, 2014

Institutional Investor

Mobile technology advances have brought about the once-unfathomable prospect that wireless security is at least on a par with traditional computing and networking systems – the very ones currently fending off an unprecedented wave of cyberattacks.

Read article

Detecting cyber attacks in a mobile and BYOD organization

October 14, 2014

Help Net Security

Explore the challenges, understand needs and evaluate mobile device management as an approach to detecting attacks. It can lead to a flexible, highly efficient solution that detects all phases of an active attack on mobile devices, regardless of device type, operating system or applications installed.

Read article

New bash bugs surface

September 29, 2014

Dark Reading

If you patched your Linux-based systems before 1:11 a.m. Eastern Daylight Time yesterday for the major Shellshock vulnerability in the Bash function, your work is not done here yet. New bugs have been reported in Bash, so it's probably time to patch again, security experts warn.

Read article

Home Depot breach bigger than Target at 56 million cards

September 18, 2014

Reuters

Vectra CEO Hitesh Sheth says that the recent Home Depot breach exposes a serious security weakness, noting that the company said hackers used unique, custom-built malware to compromise up to 56 million payment cards.

Read article

Why breach detection is your new must-have cyber security tool

September 6, 2014

Tech Crunch

It's time for CIOs to start focusing on the next line of defense in the war against cyber crime: an emerging area called breach detection, which focuses on identifying long-tail intrusions after they happen and mitigating their damage, partly through the use of big-data technologies. Your company’s information security may depend on it.

Read article

Getting a clear picture of a computer network’s security

August 30, 2014

New York Times

Security experts say the only hope of protecting corporate networks from hackers is something the industry calls “defense in depth.” The phrase simply means that plugging in one traditional defense – antivirus software, or a firewall, is no longer going to cut it.

Read article

Vectra to use Series C to grow real-time cyber threat detection

August 27, 2014

Global Security Finance

Vectra Networks, Inc. announced on August 5 it had raised a new $25 million round of funding to boost sales and marketing for its behavior-based cyber security solution.

Read article

Cyber attacks: We're fighting an asymmetric war

August 26, 2014

Computer Technology Review

Cybercriminals' ability to attack is outpacing our ability to defend. We are fighting an asymmetric war. Resources are one challenge, but so are the defensive tactics. Organizations rely on security best practices and products that were developed to counter a different threat – long before the rise of mobility, the cloud and well-organized criminals.

Read article

Video: Bloomberg TV features Vectra in a discussion about security vulnerabilities in U.S. companies

August 19, 2014

Bloomberg TV

Vectra Networks CEO Hitesh Sheth and CrowdStrike CEO George Kurtz comment on the Chinese hackers that stole personal information from 4.5 million patients of Community Health Systems and discuss how vulnerable U.S. companies are to hackers. They speak with Pimm Fox on "Taking Stock."

Read article

Vectra raises $25 million to fend off cyberattacks in real time

August 5, 2014

Silicon Valley Business Journal

Vectra Networks Inc., a San Jose startup whose software aims to protect corporate and government IT systems against cyberattacks, has raised $25 million in capital provided by Accel Partners, Khosla Ventures and Intel Capital.

Read article

Vectra detects cyberattacks in real-time, raises $25 million

August 5, 2014

VentureBeat

Accel Partners and existing investors just dropped a new $25 million into Vectra Networks, a security startup deeply connected to U.S. national security officials.

Read article

Vectra raises $25 million to stop cyberattacks in progress

August 5, 2014

Wall Street Journal

Cybersecurity firms now recognize that cybercriminals are so good at penetrating corporate and government IT systems that they can no longer be entirely blocked. One of these firms, Vectra Networks, has raised another $25 million in funding to detect and prioritize attacks in real time so customers can decide which ones to fight first.

Read article

Video: Bloomberg TV talks with Vectra CEO about cyber protection and privacy

August 5, 2014

Bloomberg TV

Bloomberg TV host Pimm Fox speaks with Vectra CEO Hitesh Sheth on how Vectra works, its contextual reporting and protecting organizations while maintaining privacy.

Read article

Survey roundup: Culture change top compliance goal

July 25, 2014

Wall Street Journal

Ben DiPietro of the Wall Street Journal looks at recent surveys and reports dealing with risk and compliance issues, including the new BYOD and Mobility Report from Vectra and the Information Security Group on LinkedIn.

Read article

Three steps to a more secure BYOD program

July 25, 2014

FierceCIO

Despite all the warnings in the tech media about Bring-Your-Own-Device, or BYOD, security risks, a minority of organizations have implemented policies or processes to address BYOD, a new study finds.

Read article

BYOD programs leave several security holes open

July 25, 2014

eWeek

Just 21 percent of more than 1,100 IT security practitioners said their organizations have fully implemented BYOD policies, processes and infrastructure, according to recent survey.

Read article

How organizations deal with BYOD and mobile security

July 24, 2014

Help Net Security

Report shows that 21 percent of organizations who acknowledge broad use of privately owned devices do not support those devices within their organizations.

Read article

More exploits expected to enter organizations via mobile devices

July 24, 2014

Mobile Marketing Watch

The second annual BYOD and Mobile Security Study reveals more exploits entering organizations via mobile devices. All told, this reality a now a top BYOD security concern, experts reveal.

Read article

Is IT really ready for BYOD security challenges?

July 24, 2014

Network World

LinkedIn survey finds enterprise mobility still in infancy.

Read article

Vectra: 79 percent of organizations lack BYOD policies

July 23, 2014

MSPmentor

New study shows malware protection is a requirement for mobile security.

Read article

Firms turn blind-eye to BYOD policy

July 23, 2014

FierceMobileIT

Close to one-fourth of organizations that have broad use of BYOD devices do not support their use, opening up the enterprise to security risks such as malware infection.

Read article

Infosec pros worried BYOD ushers in security exploits, survey says

July 23, 2014

SC Magazine

Despite the significant damage, including loss of company or client data and unauthorized access to data and systems that the use of privately owned devices without proper security can wreak, most organizations simply have not kept pace with the explosion in use of those personal devices in the workplace.

Read article

Defense in depth for advanced threat protection

July 9, 2014

Infosec Island 9 July 2014

Defense in Depth is practical strategy and "best practices" strategy in that it relies on the intelligent application of techniques and technologies that exist today.

Read article

Ten security startups to watch

June 30, 2014

Network World

Security start-ups arise because they have fresh approaches to fighting malware and cyber-espionage or combatting the insider threat through network monitoring. In this round-up of some of the newer security firms, Distil Networks, Observable Networks and Vectra Networks fit into that category.

Read article

Stop allowing your security strategy to drain IT resources

June 11, 2014

Computer Technology Review

Most organizations would say protecting high-value information and complying with regulations is a priority, but in practice, few businesses have enough IT security staff and resources to ensure that policies are defined and upheld, systems are secured, and users are trained.

Read article

Information overload: Finding signals in the noise

May 29, 2014

CSO

Sometimes it's possible to have too much threat data.

Read article

Enterprise organizations are taking steps to improve cybersecurity analytics

May 27, 2014

Network World

Last week, online retail giant eBay announced that it was hacked. Large organizations realize that they have to do more to protect themselves from cybercrime and are exploring ways to block threats and/or reduce the attack surface across their networks.

Read article

First security platform that thinks

May 5, 2014

Security Daily

The Vectra X-series platform can detect attacks at every phase of a persistent attack, regardless of how the attack enters an organization’s network and the operating system, application or device being attacked.

Read article

Vectra security appliances use data science to think

May 1, 2014

Tom's IT Pro

Vectra differentiates real threats from noise, and as an attack intensifies, the Vectra platform reports updates in real time.

Read article

Industrial computers emerge as another Heartbleed worry

April 30, 2014

Re/code

As if there weren't a sufficient number of things to worry about related to the Heartbleed vulnerability disclosed earlier this month, you can now add this to the list: Many of the world's computers used to control and manage heavy industrial equipment may be vulnerable, too.

Read article

New firm pitches cybersecurity for less well-heeled

March 27, 2014

The Wall Street Journal

Some big-name former Washington officials are backing a new cybersecurity company that seeks to help less-well-heeled clients. Vectra uses an approach en vogue: Identifying hackers already in the system rather than trying to keep them out.

Read article