about - MEDIA COVERAGE

2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014

Media coverage published in 2020

Protecting Remote Workers Against COVID-19 Ransomware

June 9, 2020

Dice

Why the pandemic and the need to work from home has brought about an increase in ransomware and how you can protect your company.

Read article

Vectra AI Offers a Security Assist to Microsoft Defender ATP and Azure Sentinel

June 9, 2020

Redmond Channel Partner Magazine

Vectra unveiled strategic integrations with Microsoft's core security technologies to emphasize the SOC visibility triad.

Read article

Vectra Teams with Microsoft Security Services for Network Threat Detection and Response

June 9, 2020

VMBlog

The combined integration of Vectra and Microsoft Security Services will result in well-coordinated responses, enhanced efficiency of security operations, and reduced attacker dwell times that drive risk for the business.

Read article

Vectra Integrates Network Threat Detection and Response for Microsoft Security Services

June 9, 2020

AiThority

AiThority covers the Vectra integration with Microsoft Security Services.

Read article

Vectra Targets SOCs With Microsoft Defender ATP, Azure Sentinel Integration

June 9, 2020

SecurityWeek

The native integration between Vectra Cognito and Microsoft Defender ATP and Azure Sentinel provides the SOC with full oversight of the state of the infrastructure, and better ability to respond to suspicious events.

Read article

Are cyber attacks really as advanced as we think?

June 5, 2020

BetaNews

BetaNews talks to our own Matt Walmsley to learn about the attack landscape, and how companies can better defend themselves

Read article

FTC Slams Children’s App Developer for COPPA Violations

June 5, 2020

Threatpost

Vectra technical director, Tim Wade, comments on why the FTC fine and requirement that unconsented data must be destroyed against a children's app developer should be applauded.

Read article

Trust but Verify-Mitigating Privileged Account Risks

June 4, 2020

InfoSecurity Magazine

By understanding how privilege access occurs between cloud instances, data centers and local networks, organizations can more easily identify a network compromise and act before a catastrophic breach.

Read article

New Tycoon ransomware leverages JIMAGE files, steals PII, encrypts Linux and Windows systems

June 4, 2020

SC Magazine

Chris Morales, head of security analytics at Vectra, states how he sees the BlackBerry/KPMG news as just another manual attack leveraging RDP to drop a file on a server for encryption.

Read article

A new threat detection model that closes the cybersecurity gap

June 4, 2020

Tahawul Tech

Ammar Enaya, regional director – Middle East, Turkey & North Africa (METNA), Vectra, discusses the benefits of making data science the foundation of new cybersecurity models.

Read article

Zoom to exclude free calls from end-to-end encryption to allow FBI cooperation

June 4, 2020

The Guardian

“In an online world, encryption is paramount to privacy, and privacy promotes safety, liberty and fairness into our social fabric,” says Tim Wade, the technical director at Vectra.

Read article

Survey: DevOps Teams Use Too Many Cloud Security Tools

June 3, 2020

The New Stack

Our technical director of the chief technology team, Tim Wade, comments on how technical complexity can exacerbate risk, particularly in a cloud shared-responsibility model.

Read article

Hitesh Sheth, Vectra CEO, on Cybersec During the Pandemic, Threats, and AI

June 3, 2020

TechNadu

In this interview with TechNadu, Vectra CEO, Hitesh Sheth, provides insight into Vectra and its tools, the current threatscape, and the things that can be done to keep personal and company data safe.

Read article

How cyberattackers evade threat signatures – The case for behaviour-based threat detection

June 2, 2020

Intelligent CISO

Intelligent CISO talks to Vectra METNA Regional Director, Ammar Enaya, on why there is a need for behaviour-based threat detection.

Read article

Industry Reactions to Verizon 2020 DBIR: Feedback Friday

May 22, 2020

Security Week

"Attribution is interesting in the sense that it demonstrates who is behind a breach and what they do. The motives behind an attack tend to be consistent for each industry, as does the risk and data in those industries," says Chris Morales, head of security analytics at Vectra.

Read article

Securing the cloud for healthcare

May 21, 2020

Beta News

Recent warnings and actual attacks are a prominent example of the active and persistent threats to our global healthcare networks, economy, and connected infrastructure.

Read article

Here’s what security professionals took away from Verizon’s annual data breach report

May 20, 2020

SiliconANGLE

Chris Morales talks to SiliconANGLE on why the threat landscape has dramatically shifted over the last few months and that this threat landscape that might be more permanent than temporary.

Read article

UK airline easyJet data breach impacts 9M customers – expert commentary

May 20, 2020

Information Security Buzz

Matt Walmsley provide commentary on the EasyJet breach and why transportation, as part of critical national infrastructure, is a tempting target for cybercriminals.

Read article

ICO a ‘toothless tiger’ claim commentators, as EasyJet breach

May 20, 2020

SCMagazineUK.com

Learn why even though the EasyJet breach exposed 9 million user, there may not be fines for this compromise.

Read article

9 Million Customer Records Compromised in EasyJet's Cyberattack

May 20, 2020

Security Magazine

Chris Morales provides his perspective on how the EasyJet breach occurred—most likely the compromise of a web facing application like the travel booking system.

Read article

EasyJet Hack: Security Expert Reactions

May 20, 2020

Silicon UK

Learn why although the EasyJet breach is significant, there may not be a fine during this global healthcare crisis, where the transportation industry is already hurting.

Read article

Verizon 2020 DBIR: More Extensive, More Detailed and More Thorough Than Ever

May 19, 2020

Security Week

Read about the Verizon's 2020 Data Breach Investigations Report (DBIR) with 81 contributing organizations, and more than 32,000 incidents analyzed (of which 3,950 were confirmed breaches).

Read article

“Highly sophisticated” EasyJet Hack Compromises Personal Data of 9 Million People

May 19, 2020

NewStatesman Tech

“Even if EasyJet were found to be significantly accountable by the ICO, I doubt there would be much appetite for a big GDPR fine when the sector is already on its knees,” says Matt Walmsley, EMEA Director at Vectra.

Read article

Verizon: Breaches Targeting Cloud-Based Data Doubled in 2019

May 19, 2020

BankInfoSecurity.com

In response to the latest Verizon data breach report, our Chris Morales talks about why he expects new breach trends to emerge in 2020 as a result of the pandemic's impact with the uptick in use of apps like Zoom and other SaaS apps.

Read article

EasyJet data breached: over 9 million customers affected

May 19, 2020

Information Age

Matt Walmsley discussed why there may be no fines for EasyJet during this global health crisis.

Read article

Verizon 2020 Data Breach Report: Money Still Makes the Cyber-Crime World go Round

May 19, 2020

Security Magazine

Verizon's latest data breach report shows that financial gain is still the key driver for cybercrime. Our own Chris Morales discuses that with the global pandemic and people working from home, and using SaaS apps that the attack vectors may forever change the landscape.

Read article

Why Partnerships in the Cybersecurity Sector are So Important

May 18, 2020

Intelligent Tech Channels

Since no one vendor can provide full security coverage, Matt Walmsley explains why partnerships in cybersecurity are critical to helping detect and remediate threats quickly.

Read article

The cybersecurity experts defending the UK against elite coronavirus hackers

May 17, 2020

The Telegraph

With the current global health emergency, research and data from universities and healthcare orgagnisations has become extra valuable and has thus become a target for attacks.

Read article

UK Supercomputing Service ARCHER Still Offline After Monday Attack

May 15, 2020

Dark Reading

The UK Supercomputing Service ARCHER is likely still offline due to the need to reissue keys and passwords to all researchers, according to Chris Morales, head of security analytics at Vectra.

Read article

8 Supply Chain Security Requirements

May 15, 2020

Dark Reading

"Quite often risks have more to do with operational process, such as storing in an exposed database in the cloud, than it does with a flaw or vulnerability in code," says Chris Morales, head of security analytics at Vectra.

Read article

British Supercomputer ARCHER Suffers Cyberattack

May 15, 2020

Security Magazine

The British Supercomputer used for academic research by Universities operating in the U.K. has been hit by a cyberattack, forcing the admin to reset all user passwords and SSH keys. 

Read article

Pitney Bowes Hit with Second Ransomware Attack

May 12, 2020

SC Magazine

Tim Wade, technical director, CTO Team at Vectra, urged caution not to make hasty assumptions about Pitney Bowes’ security capabilities without understanding the full context of the two ransomware incidents.

Read article

AiThority Interview with Hitesh Sheth, CEO at Vectra

May 8, 2020

AIThority.com

"Digital Transformation can become a task rife with complexities and it is no surprise that security risks become a byproduct of that," Hitesh Sheth, Vectra CEO

Read article

World Password Day 2020: Passwordless, Credential Stuffing, and Password Managers

May 7, 2020

Solutions Review

World Password Day 2020 continues as cybersecurity experts from around the world discuss the topics at the forefront of password security. These include passwordless authentication, credential stuffing attacks, password managers, and more.

Read article

Expert Advice During World Password Day 2020

May 7, 2020

VM Blog

Is passwordless authentication the future? Hear from security experts including our own technical director of the CTO Team, Tim Wade.

Read article

Is Passwordless Authentication the Future?

May 7, 2020

Security Magazine

"It’s important to consider that an effective authentication system must also account for effective credential revocation and replacement as much as credential strength – there are few things more trivially revoked and replaced than the knowledge inside someone’s head," Tim Wade, Technical Director, CTO Team at Vectra.

Read article

Secure home office: Vectra points to 8 key aspects

May 6, 2020

Infopoint Security

Andreas Müller , Director of the DACH region at Vectra , explains which 8 aspects currently need to be considered for securing the remote workforce.

Read article

GoDaddy Confirms Data Breach - 28,000 Customers Affected

May 6, 2020

Security Magazine

Our own Matt Walmsley comments on the GoDaddy data breach and why it's critical to monitor how privileged credentials are used.

Read article

CISA and NCSC Publish Advisory on APT Groups Targeting Healthcare and Essential Services

May 6, 2020

Security Magazine

Chris Morales, head of security analytics at Vecta, discusses why strong passwords are not enough to to defend against password spraying.

Read article

Why partnerships in the cybersecurity sector are so important

May 5, 2020

Intelligent Tech Channels

Matt Walmsley, head of EMEA marketing at Vectra, explains why partnerships in the cybersecurity sector are so important.

Read article

GoDaddy Takes Seven Months to Discover Data Breach

May 5, 2020

SC Magazine

“It’s unclear whether GoDaddy’s reported incident was because of the re-use of previously stolen credentials or from brute force attacks," says Matt Walmsley, EMEA Director at Vectra.

Read article

GoDaddy Data Breach Shows Why Businesses Need to Better Secure Their Customer Data

May 5, 2020

Tech Republic

"Regardless of how the unauthorized access was gained, it's a sharp reminder that the monitoring of how privileged credentials are used, not just granted, can make the difference between detecting an active attack and being blissfully ignorant to a breach," says Matt Walmsley, EMEA director at Vectra.

Read article

APT Groups Targeting Healthcare Organisations, NCSC Warns

May 5, 2020

Teiss

Chris Morales, head of security analytics at Vectra, said that the password spraying is a highly opportunistic technique that continually works because passwords are commonly reused across multiple services.

Read article

APT groups targeting healthcare organisations, NCSC warns

May 5, 2020

teiss

In light of the recent warnings by the National Cyber Security Centre and the U.S. Department of Homeland Security of attacks targeting healthcare organisations, Chris Morales, Vectra's head of security analytics, comments to teiss on why techniques like password spraying continue to work and are used for opportunistic access,

Read article

GoDaddy confirms October data breach impacted hosting accounts

May 5, 2020

teiss

Data breaches serve as a good reminder for all that the monitoring of privileged credentials is critical and can make the difference between detecting an active attack and being unaware of a breach.

Read article

The attacker and the data centre

May 4, 2020

ITProPortal

Our own Matt Walmsley talks to ITProPortal on how attackers access the data centre and why early detection can make the difference between a contained incident or a successful takeover.

Read article

COVID-19 Contact Tracing Apps: Effective Virus Risk Management Tools or Privacy Nightmare

May 4, 2020

SecurityWeek

Learn about contact tracing apps and the potential dangers for misuse. While they could be a way to aid in efficiently recognizing and quarantining only those people who are infected or at risk of being infected during this pandemic, it also brings up privacy concerns and how that data is going to be collected, and used for the future and if people even understand the risks.

Read article

Over 40% security pros lack tools needed to fight cyber attacks, finds ISACA

May 4, 2020

teiss

As security teams adapt to the increase in remote working, things like RDP / VDI, VPN, and SaaS application usage, have expanded the remote access attack surface that needs protecting and monitoring, and of which many organisations have limited visibility.

Read article

How ransomware attacks are making the most of the COVID-19 crisis [Q&A]

May 1, 2020

BetaNews

"What's scary is the access you need to encrypt a network file is the exact same access you need to copy all the data and move it somewhere else," says Chris Morales, head of security analytics at Vectra.

Read article

Technado, Ep. 149: Vectra’s Chris Morales

April 30, 2020

ITProTV

Chris Morales, Head of Security Analytics at Vectra, joined this podcast to talk about incident response and threat management programs.

Read article