Angela Heindl-Schober

EMEA Director Field & Channel Marketing

Angela Heindl-Schober is EMEA Director Field & Channel Marketing at Vectra. For 19 years she works with great passion in the IT- and technology-focused marketing of US IT companies. In leading positions such as Riverbed, Infor and Invensys Software Systems, Angela Heindl-Schober has successfully developed and implemented marketing strategies and campaigns across EMEA. She was also responsible for telemarketing, event and digital marketing and was instrumental in brand positioning.

All blog posts from this author

Breach

Der Vectra Post-Intrusion-Report Frühjahr 2016

April 22, 2016
Read blog post
Artificial Intelligence

Insider Threats: Spotting “the Inside Job“

December 14, 2015
Read blog post
Threat detection

Wir brauchen eine Alternative zu signaturbasiertem Schutz

November 13, 2015
Read blog post
Breach

Gesucht: Die Nadel im Heuhaufen der IT-Security

February 22, 2016
Read blog post
Cybersecurity

Ransomware-Lehren von Julius Caesar

June 28, 2016
Read blog post
Breach

Der Kanarienvogel in der Ransomware-Mine

June 15, 2016
Read blog post
Cybersecurity

Wie Cyber-Kriminelle in Unternehmensnetzen Angriffe vorantreiben

June 22, 2017
Read blog post
Infrastructure

Neue Lösung von Vectra Networks schließt Sicherheitslücken in Rechenzentren und Public Clouds

September 13, 2016
Read blog post
Threat detection

Wird IDS zukünftig wieder als zuverlässige Angriffserkennung akzeptiert?

January 12, 2016
Read blog post
Breach

IT-Sicherheit & Industrie 4.0: Sind Unternehmen gegen Cyberattacken gewappnet?

April 25, 2016
Read blog post
Artificial Intelligence

Automatisierung für mehr Effizienz in Sicherheitsabteilungen

February 1, 2016
Read blog post
Breach

Neue Ransomware zielt auf Unternehmen

May 13, 2016
Read blog post
Cybersecurity

Schwachstelle Rechenzentrum: Virtuelle Umgebungen forcieren Datenklau

December 19, 2016
Read blog post

Angela Heindl-Schober

EMEA Director Field & Channel Marketing

Angela Heindl-Schober is EMEA Director Field & Channel Marketing at Vectra. For 19 years she works with great passion in the IT- and technology-focused marketing of US IT companies. In leading positions such as Riverbed, Infor and Invensys Software Systems, Angela Heindl-Schober has successfully developed and implemented marketing strategies and campaigns across EMEA. She was also responsible for telemarketing, event and digital marketing and was instrumental in brand positioning.

Posts from

Angela Heindl-Schober

July 21, 2021
|
By
Marcus Hartwig

Microsoft Partners with Vectra to Deliver Zero Trust Security 

Microsoft partners with Vectra to deliver Zero Trust security framework to provide analytics and mitigate threats emerging from distributed and hybrid-remote workforces.

Read More
July 15, 2021
|
By
Vectra

Confronting Risk and Exposure in Healthcare

Attackers intent on stealing personally identifiable information (PII) and protected health information (PHI) can easily exploit gaps in IT security policies and procedures to disrupt critical healthcare-delivery processes.

Read More
July 13, 2021
|
By
Rohan Chitradurga

MITRE D3FEND: Learn MITRE D3FEND Framework & Techniques

After obsessing for years over pushing the limits with AI to detect cyberattacker behavior, Vectra is proud to hold the most patents referenced in MITRE D3FEND.

Read More
July 5, 2021
|
By
Hitesh Sheth

Prevention and Preparedness Revisited: Cyber Defense After Kaseya Ransomware Attack

There should be fresh scrutiny of SaaS subscription relationships, and the security policies of managed service providers; you’re only as secure as your provider.

Read More
July 4, 2021
|
By
Willem Hendrickx

New Think Tank Report Shapes EU Thinking on AI and Cybersecurity

Vectra is key contributor to new CEPS Report on the Technology, Governance and Policy Challenges of AI and Cybersecurity and supports Vectra’s mission to make the world a safer and fairer place.

Read More
July 2, 2021
|
By
Luke Richards

Putting CVE-2021-1675 PrintNightmare to Rest

A new remote code execution vulnerability in Windows Print Spooler, now known as CVE-2021-1675, or PrintNightmare can be exploited by attackers to take control of affected systems. Find out how to detect and stop this exploit with Vectra.

Read More
June 29, 2021
|
By
Jennifer Geisler

Taking Down Cloud Threats for the Win

Vectra is honored to be named Cloud Security/SaaS Disruptor Company of the Year with a Gold Globee® Award in the Annual 2021 Awards.

Read More
June 29, 2021
|
By
Joe Malenfant

Demystifying Cloud Security with Forrester

The rapid shift to cloud-everything left users and apps vulnerable to security threats across all environments. Andras Cser from Forrester joined Joe Malenfant and Gokul Rajagopalan from Vectra to discuss cloud trends among organizations.

Read More
June 29, 2021
|
By
Jennifer Geisler

クラウドの脅威を撃退して勝利を手に入れる

Vectra AI社は先日、クラウドセキュリティに関する賞である「Globee 2021Disruptor Company Award for Security Cloud/SaaS」を受賞いたしました。

Read More
June 24, 2021
|
By
Henrik Davidsson

Are You Transforming Your SOC Yet?

As SOC 1.0 remains the norm for many organizations, this way of doing things does have its challenges. See why more organizations are updating their approach in an effort to spot attacks faster while benefiting from a cost savings.

Read More
June 22, 2021
|
By
Joe Malenfant

5 Things to Know About DarkSide Ransomware | Vectra AI

DarkSide ransomware as a service (RaaS) group provided hackers with a convenient way to extort money from organizations after access was gained. Here are five things you need to know about this prominent cybercriminal group.

Read More
June 16, 2021
|
By
Joe Malenfant

Vectra Introduces Detect for AWS: Threat Detection and Response for IaaS and PaaS | Vectra AI

Vectra introduces Detect for AWS, solving threat detection and response for Platform as a Service (PaaS) and Infrastructure as a Service (IaaS) environments.

Read More
June 14, 2021
|
By
Tim Wade

Detecting Attackers as They Head Towards Your Money

What makes threat detection so challenging? We answer that question and provide the expert insight around our latest Spotlight Report—Vision and Visibility: Top 10 Threat Detections for Microsoft Azure AD and Office 365.

Read More
June 2, 2021
|
By
Tim Wade

Is the Cloud Control Plane a New Frontline in Cybersecurity?

As cloud adoption continues to accelerate, the evolution of the next generation of modern attacks will traverse through and towards an enterprise’s cloud control plane. Learn why this risk should not be underestimated.

Read More
May 26, 2021
|
By
Matthew Pieklik

Supply Chain Attacks: Spotting & Preventing Supply Chain Attacks | Vectra AI

Supply chain attacks represent an appealing opportunity for attackers. See why this type of attack is gaining in popularity and what defenders need to know to keep their organization safe.

Read More
May 19, 2021
|
By
Matthew Pieklik

Microsoftクラウド環境における「普通ではない」を検知する

最新のスポットライトレポートでは、MicrosoftのAzure ADとOffice365で見られる脅威トップ10によって、環境全体においてセキュリティチームが異常もしくは安全と判断する方法を紹介しています。

Read More
May 19, 2021
|
By
Matthew Pieklik

Detecting the “Out of the Ordinary” in Your Microsoft Cloud Environment

In our latest Spotlight Report, see how the Top 10 Threat Detections seen across Microsoft Azure AD and Office 365 allow security teams to detect infrequent behavior that is abnormal or unsafe across their environments.

Read More
May 18, 2021
|
By
Sam Martin

Achieve Zero Trust Access Visibility with Zscaler and Vectra

We’re excited to announce a new integration with Zscaler! Find out how this integration with Cognito Detect provides end-to-end access visibility and protection for remote workers and business-critical applications.

Read More
May 17, 2021
|
By
Tim Wade

Here We Go Again....One Week After the Colonial Pipeline Attack, More Ransomware

Just a week after the Colonial Pipeline was shut down due to ransomware—attackers are at it again. It’s now being reported that Ireland’s health service shut down its IT systems and a company in Germany had to fork out a $4.4 million ransom on the same day.

Read More
May 13, 2021
|
By
Henrik Davidsson

The Best Way to Stay Breached

Cyberattacks are hitting the headlines around the world and there seems to be no end to the noise the attacks are making. We dive into what an organisation should do to stay breached.

Read More
May 6, 2021
|
By
John Mancini

Azure AD Attackers Beware - Vectra Sees You

The Vectra Cognito Azure AD Privilege Anomaly Detection is a radical step forward when detecting account takeover events targeting Azure AD to gain access to mission-critical SaaS applications. With it, teams are alerted, and attacks can be stopped before they cause harm.

Read More
May 1, 2021
|
By
Hitesh Sheth

This is a test blog post

This is the post summary.

Read More
April 30, 2021
|
By
Hitesh Sheth

How a Global Retailer Passed Red Team Tests with Vectra

Every year, this global retail giant in the beauty industry failed to pass red team exercises—until they deployed Vectra. Get the full story on how they use the Cognito platform to pass Red Team testing and ensure the overall security of its data.

Read More
April 26, 2021
|
By
Joshua St. Hilaire

Command and Control (C2) Evasion Techniques, Part 2

Network and endpoint defense technologies will have to either rapidly update signatures or use other investigative ways to detect command and control (C2). Uncover how threat actors evade security tools to execute C2 techniques to learn about what you should look for.

Read More
April 22, 2021
|
By
Jose Malacara

Threat Detection and Response for Everywhere the Adversaries Go

We’re excited to announce extended EDR native integration support in the Cognito platform! Find out how you can benefit from these simple, seamless integrations for comprehensive coverage across the enterprise, IoT devices, hybrid cloud, and cloud environments.

Read More
April 10, 2021
|
By
Hitesh Sheth

2021年の挑戦:サイバーセキュリティと女性

平等性と包摂性は、Vectra AIにとって文化の重要な要素です。今年の国際女性デーは、サイバーセキュリティ業界の女性を祝福するとともに、この業界での可能性についてお伝えしたいと思います。

Read More
April 8, 2021
|
By
Hitesh Sheth

Choosing to Challenge 2021: Women in Cybersecurity

For us as Vectra, equality and inclusivity are key components of our culture. This International Women's Day, we want to celebrate the women in cybersecurity and highlight the opportunities available in the industry.

Read More
April 7, 2021
|
By
Jennifer Geisler

This is a test blog post for another dummy article for spacing.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique. Duis cursus, mi quis viverra ornare, eros dolor interdum nulla, ut commodo diam libero vitae erat. Aenean faucibus nibh et justo cursus id rutrum lorem imperdiet. Nunc ut sem vitae risus tristique posuere. Justo cursus id rutrum lorem imperdiet. Nunc ut sem vitae risus tristique posuere.

Read More
March 30, 2021
|
By
Niall Errity

Spot, Stop, and Lock It with Vectra

Find out how Vectra’s native integrations with Microsoft and AWS enable security teams to automatically contain events directly from the Cognito platform.

Read More
March 29, 2021
|
By
Marc Gemassmer

Vectra Honored with CRN’s Prestigious 5-Star Partner Program Rating

Vectra is honored to receive recognition from CRN by honoring the Vectra Partner Program with its prestigious 5-Star Partner Program Rating. We couldn’t be more thrilled about this award and our amazing partner community.

Read More
March 25, 2021
|
By
Hitesh Sheth

This is a test blog post for another dummy article

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique. Duis cursus, mi quis viverra ornare, eros dolor interdum nulla, ut commodo diam libero vitae erat. Aenean faucibus nibh et justo cursus id rutrum lorem imperdiet. Nunc ut sem vitae risus tristique posuere.

Read More
March 24, 2021
|
By
Tim Wade

Today’s Security Forecast: Cloudy with a Chance of Account Takeovers

Account takeovers and identity-based attacks are on the rise, with Microsoft Office 365 at the heart of these threats. Find out what concerns are top of mind for IT decision makers when it comes to Office 365 security and protecting data in the cloud.

Read More
March 24, 2021
|
By
Tim Wade

本日のセキュリティ予報:クラウドアカウント乗っ取りの可能性あり

アカウントの乗っ取りとアイデンティティベース攻撃が増加しており、その中心にOffice 365があります。Office 365およびクラウド上のデータ保護の分野において現在、ITの責任者が懸念としてあげている問題についてご紹介します。

Read More
March 22, 2021
|
By
Niall Errity

When You're on the Clock, Vectra's Got Your Lock

Speed is a key ingredient to successful containment but switching between security solutions find the host or policy you want and applying it all takes time. Vectra enables security teams to enforce directly in the platform, saving valuable time for security operations.

Read More
March 15, 2021
|
By
Tim Wade

Office 365 and Cloud Security Insights: Reasons for Optimism Despite Risks

Despite 71% of organizations suffering malicious SaaS account takeover, 90% are still accelerating cloud adoption. Surprising? Maybe not – read on as this blog distills the takeaways from mid-sized and large Office 365 enterprises.

Read More
March 11, 2021
|
By
Sam Martin

Vectra SOC 2 Type 2 Compliance Reinforces Commitment to Data Privacy and Protection

We’re excited to announce that Cognito Detect and Cognito Recall have successfully achieved SOC 2 Type 2 compliance. Find out how this milestone further ensures the security and confidentiality of our customers’ and partners’ data.

Read More
March 10, 2021
|
By
Gokul Rajagopalan

Extend Vectra Threat Detection to Xen-based EC2 Workloads

Announcing extended coverage of Vectra in your entire AWS cloud footprint using the new AWS traffic mirroring capabilities on EC2 instances based on the popular Xen platform.

Read More
March 4, 2021
|
By
John Mancini

Hafnium Attack Exploits On-premise Microsoft Exchange Servers

The Hafnium campaign is targeting Microsoft Exchange Servers by leveraging several zero-day exploits and allows attackers to bypass authentication, including MFA to access e-mail accounts. Read more about hot to detect and stop the attack with Vectra Cognito.

Read More
February 22, 2021
|
By
Tim Wade

3 Guideposts for Organizational Security

Security leaders need to measure success, but too often the exercise focuses more on the absence of failure than the presence of success. Here’s three practical guideposts to achieve meaningful organizational security.

Read More
February 22, 2021
|
By
Tim Wade

組織のサイバーセキュリティにおける3つの指針

ビジネスにおいてセキュリティとテクノロジーの担当者は、セキュリティ対策の効果の成功度合いを測定する必要があります。ただ、多くの場合、成功の有無よりも失敗の有無に焦点が当てられています。組織のセキュリティにおいて実践可能な具体的な指針をご紹介します。

Read More
February 17, 2021
|
By
Vectra

SUNBURST & The World’s Largest Supply Chain Cyber Attack | Vectra AI

Vectra researchers have dissected the SolarWinds supply chain compromise from the initial backdoor to the establishment of persistent access in the data center and cloud environments. A specific focus is provided for Microsoft Office 365, which appears to have been a key target.

Read More
February 17, 2021
|
By
Vectra

SUNBURST問題まとめ:既存のアクセスモデルによる世界最大のサプライチェーン攻撃の経緯

Vectra AIのリサーチャーは、SolarWindsのサプライチェーンへの侵害を、最初のバックドアからデータセンターやクラウド環境での永続的なアクセスの確立に至るまで分析しました。中でも攻撃の主要なターゲットとなっているMicrosoft Office 365に焦点を当てました。

Read More
February 11, 2021
|
By
Sam Martin

Cloud Identity Detections with Azure AD

Vectra announces extended support for Azure AD in Cognito Detect for Office 365. Find out how this increased coverage can secure users’ cloud identities and reduce consequences of supply chain attacks.

Read More
February 10, 2021
|
By
Hitesh Sheth

Sanofi bloque une cyberattaque en temps réel grâce à Cognito

Pendant la pandémie, les pirates ont profité des informations sur le COVID-19. Découvrez comment un message LinkedIn ordinaire a déclenché une réaction en chaîne qui a conduit à une attaque généralisée et astucieuse contre l'une des principales sociétés pharmaceutiques.

Read More
February 10, 2021
|
By
Hitesh Sheth

Sanofi stoppt mit Cognito in Echtzeit einen Cyber-Angriff

Während der Pandemie haben Hacker Informationen über COVID-19 genützt. Finden Sie heraus, wie eine gewöhnliche LinkedIn-Nachricht eine Kettenreaktion auslöste, die zu einem weit verbreiteten, raffinierten Angriff auf eines der weltweit führenden Pharmaunternehmen führte.

Read More
February 8, 2021
|
By
Jennifer Geisler

Jessica Couto Recognized as 2021 CRN Channel Chief

CRN® has named Jessica Couto, VP of Channel, Americas, at Vectra AI, to its 2021 list of Channel Chiefs. The prestigious CRN® Channel Chiefs list, released annually, recognizes prominent leaders that demonstrates exceptional leadership, vision, and commitment to their channel partner programs.

Read More
February 4, 2021
|
By
John Mancini

Azure AD Security Solutions - Azure AD Detection Coverage

As witnessed by the SolarWinds attack, compromising a single Azure AD account gives an attacker access to multiple SaaS apps, including Microsoft Office 365. This single point has made it critical for organizations to be able to detect and respond to attacks from Azure AD.

Read More
February 4, 2021
|
By
John Mancini

Azure ADの検知が必須である単純明快な理由

単一のAzureADアカウントを侵害することで、攻撃者はMicrosoftOffice 365を含む複数のSaaSアプリケーションにまたがる大量のデータにアクセスすることができてしまうことをSolarWindsへの攻撃から学んだかと思います。AzureADへの侵害をどのように検知および対応できるのかご紹介します。

Read More
February 1, 2021
|
By
Hitesh Sheth

Sanofi Uses Cognito to Stop Cyberattack in Real Time

The pandemic has made threat actors eager to exploit information about COVID-19. Find out how an ordinary LinkedIn message set off a chain reaction that escalated into a widespread, sophisticated attack at one of the world's leading pharmaceutical companies.

Read More
January 28, 2021
|
By
Joshua St. Hilaire

Command and Control (C2) Evasion Techniques

Learn how Command and Control (C2) frameworks are continuing to evolve in order to evade detection. Here we will examine a method known as JA3 signature randomization.

Read More
January 26, 2021
|
By
Christopher Thissen

2020’s Biggest Stories in AI

In 2020 we got a glimpse of just how much AI is beginning to penetrate everyday life. However, practical applications raise important questions about the ethical use of AI. In this blog, we reflect on the biggest stories in AI from last year.

Read More
January 26, 2021
|
By
Christopher Thissen

2020年、AIにおける最も大きなニュース

2020年は、AIが日常生活に浸透し始めていることを垣間見ることができた年と言えます。AIが現実世界で使われるということは、AIの倫理的な利用についても検討する必要が出てきます。AIにおいて2020年で最も話題となったGPT-3をご紹介します。

Read More
January 21, 2021
|
By
Marc Gemassmer

The SolarWinds Breach and its Case for Network Detection and Response (NDR)

Learn from Vectra CRO, Marc Gemassmer, what makes the SolarWinds hack unique from other breaches and how network detection and response can help remediate similar attacks in the future.

Read More
January 21, 2021
|
By
Marc Gemassmer

SolarWindsの侵入とネットワーク検知および対応(NDR)の事例

SolarWindsに関する侵害の特徴と、今回のような攻撃に対してネットワークの検知と対応(NDR)は何ができるのかを VectraAI社のCRO、Marc Gemassmerが紹介いたします。

Read More
January 14, 2021
|
By
Marcus Hartwig

Why the NIST Zero Trust Architecture No Longer Requires Decryption

Learn why a successful implementation of a Zero Trust Architecture requires a modern network detection and response solution that can collect metadata about encrypted traffic – without relying on the overhead of agents.

Read More
January 13, 2021
|
By

This is a test blog post for another dummy article with a longer title

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique. Duis cursus, mi quis viverra ornare, eros dolor interdum nulla, ut commodo diam libero vitae erat. Aenean faucibus nibh et justo cursus id rutrum lorem imperdiet.

Read More
January 12, 2021
|
By
Andreas Müller

Das Jahr im Rückblick – und das kommende Jahr

Es ist wieder an der Zeit, uns die jüngere Vergangenheit anzuschauen und in die Zukunft zu blicken und darauf, was uns das nächste Jahr in puncto Cyber-Sicherheit bringen wird.

Read More
January 7, 2021
|
By
Chris Fisher

Why Accelerated Cloud Adoption Exposes Organisations to Security Risk

As our reliance on technology grows, so does the need for robust cybersecurity to protect users and keep data and business operations safe.

Read More
January 7, 2021
|
By
Chris Fisher

クラウド化への加速による 組織のセキュリティリスクの増加

テクノロジーへの依存度が飛躍的に高まるにつれ、ユーザーを保護し、ハッカーからデータとビジネスを安全に保つための強固なサイバーセキュリティの必要性も高まっています。

Read More
January 6, 2021
|
By
Oliver Tavakoli

Office 365 Threats and Inversion of the Corporate Network

The number of threats targeted towards Office 365 users and other similar platforms will undoubtedly continue to grow in 2021. Learn from our CTO, Oliver Tavakoli, what your company can do to prepare for the rise of targeted SaaS threats in 2021.

Read More
January 6, 2021
|
By
Oliver Tavakoli

Office 365の脅威と企業ネットワークの逆転

Office365ユーザーやその他の類似プラットフォームを標的とした脅威の数は、2021年も増加し続けることは間違いありません。SaaSを使うことから生まれるリスクへの回避方法をVectraAI社のCTO OliverTavakoliが解説します。

Read More
January 5, 2021
|
By
Marcus Hartwig

5 Steps of an Actual Maze Ransomware Post Incident

Discover step-by-step how Vectra identified early indicators of a ransomware attack and prevented the encryption of network file share in this blog.

Read More
December 17, 2020
|
By
Gearoid O Fearghail

Gone in a Flash: How Vectra Tracks and Flags Flash Usage in Your Network

With Adobe Flash officially marking its end-of-life on Jan. 1, 2021, assessing Flash usage is imperative to prevent attacks though that avenue. Cognito Recall from Vectra now has a Flash dashboard to help organizations decommission Flash across their networks.

Read More
December 17, 2020
|
By
Gearoid O Fearghail

Flashサポート終了:ネットワーク内のFlash使用状況を追跡し、フラグを立てる方法

昨年2020年12月31日を持って、Adobe Flashは正式にサポート終了を迎えました。サポート終了後もFlashの使用を続けると、悪意を持つものにとって恰好の攻撃の対象となり得ます。Vectra AI社の製品を使いFlashの使用状況を簡単に追跡する方法をご紹介します。

Read More
December 15, 2020
|
By
Sam Martin

Understand Your Environment Better with Security Insights from Vectra

Discover how the new security insights feature in the Vectra Cognito network detection and response platform eliminates the need for analysts to pivot between tools and provides additional insights related to attacker detections.

Read More
December 15, 2020
|
By
Luke Richards

SolarWinds Orion Hack: What To Know and How to Protect Your Network

Discover what you need to know about the SolarWinds Orions compromise, how it unfolded and why monitoring users in the cloud is imperative to protect your enterprise.

Read More
December 15, 2020
|
By
Luke Richards

SolarWinds: 知っておくべきこと、 すべき対策

SolarWinds社のOrionsを介した攻撃について知っておくべきこと、そして今回の攻撃どのように展開されたのか、そしてクラウド上のユーザーを監視することが企業を保護するために不可欠である理由をご説明します。

Read More
December 11, 2020
|
By
Nathan Einwechter

FireEye Breach: Attack Details & How FireEye Rapidly Responded

Discover new learnings from the FireEye breach, including the objectives of the stolen tools, how those tools would present on the network, and how behavior-based detection can identify their use in an attack.

Read More
December 10, 2020
|
By
Vectra

Beware of Malicious Websites and Using Identical Passwords this Holiday Season

Learn how to mitigate online shopping threats and keep your personal data safe this holiday season.

Read More
December 10, 2020
|
By
Vectra

ホリデーシーズンは悪質なウェブサイトに特にご注意を

Vectra AI社のセキュリティ分析責任者であるクChris Moralesが、オンラインショッピングの脅威を軽減し、ホリデーシーズンに個人データを安全に保つ方法を紹介いたします。

Read More
December 8, 2020
|
By
Matt Walmsley

How to Track Attackers as They Move to Your Network from the Cloud

Most solutions today provide siloed views of an account, making it impossible to track attack progression across the cloud and network – except ours. We're excited to release a unified view of an account, one that tracks attacker behaviors across network and cloud.

Read More
December 3, 2020
|
By
Vectra

How Attackers Use Business Email to Compromise Office 365

With more than 200 million monthly subscribers, Office 365 is a rich target for cybercriminals. Learn why MFA no longer stops attackers in this new cybersecurity landscape but network detection and response can.

Read More
November 30, 2020
|
By
Oliver Tavakoli

The Year in Review— and the Year to Come

Vectra CTO Oliver Tavakoli looks back on a disruptive 2020 and shares his view of what 2021 holds for security practices.

Read More
November 19, 2020
|
By
Christophe Jolly

Les Enjeux De La Transformation Du SOC

Aujourd’hui encore, il faut une moyenne de 200 jours pour repérer une attaque informatique, la plupart des outils préventifs s’arrêtant après la primo infection. En effet, en matière de sécurité informatique, une fois qu’un élément est compromis et qu’un attaquant a réussi à pénétrer un élément du système, il est quasiment impossible de le détecter

Read More
November 19, 2020
|
By
Jennifer Geisler

Why Did Vectra Make the Deloitte Fast 500 for Third Year in a Row?

Learn why we are celebrating our placement in the Deloitte Fast 500 list as an achievement and testament to a customer-first approach rather than a numbers goal.

Read More
November 19, 2020
|
By
Jennifer Geisler

Vectra AI社が3年連続でDeloitte Fast 500のリスト入りした理由

Vectra AI社は、DeloitteFast 500に3年連続でランクインしました。今回は私たちの客様第一の取り組みについてご紹介します。

Read More
November 18, 2020
|
By
Joe Malenfant

Protecting Cloud Users and Data Across the Entire Network with Expanded Cloud Services

Learn how Vectra protects users and data beyond the traditional network by detecting malicious intent and tracking and stopping attackers who move between cloud, hybrid, and enterprise – ultimately reducing the risk of breach.

Read More
November 5, 2020
|
By
Vectra

The Business of Ransomware is Changing—Detection and Response Needs to Change Too

“Ransomware operators” are rational economic entities that have evolved their tactics to optimize their ill-gotten financial returns. Their behavior changes mean detection and response approaches must change too.

Read More
October 28, 2020
|
By
Vectra

Incident Response and Knowing When to Automate

The goal of an efficient incident response process is to free-up security analyst's time to focus on higher value work that requires critical thinking. Learn how automation can be applied to a detection and response process.

Read More
October 27, 2020
|
By
Eric Hanselman

Parting the Clouds in Threat Hunting

Learn from Principle Research Analyst, Eric Hanselman, from 451 Research how the combination of the right data and the right analytics can help security teams to secure what is an important resource for the modern enterprise.

Read More
October 26, 2020
|
By
Matt Walmsley

A Tale of Two Attacks: Shining a Security Spotlight on Microsoft Office 365

Vectra research highlights how attackers are using built-in tools and services to attack Office 365. We examine two such attacks that were detected and thwarted by organizations protected by Cognito Detect for Office 365.

Read More
October 26, 2020
|
By
Vectra

2つのケーススタディ:Microsoft Office 365 のセキュリティ

世界で最も利用されているSaaSアプリケーションであるOffice 365に対する攻撃についてまとめたレポートを2つのケーススタディと共にご紹介します。

Read More
October 22, 2020
|
By
Marcus Hartwig

Why NDR is a Required Component of NIST Zero Trust Architecture

National Institute for Standards and Technology (NIST) publication for the Zero Trust Architecture (NIST SP 800-207) relies heavily on continuous and accurate monitoring. Find out why network detection and response (NDR) is a required component.

Read More
October 21, 2020
|
By
Henrik Davidsson

The Value of NDR Use Cases for Your SIEM

If you are in security operations, have you ever wondered how long it will take before use cases and playbooks are ready or prove value to your organization?

Read More
October 20, 2020
|
By
Vectra

How to Win the Cybersecurity Battle in Healthcare

When you factor in how long it takes to discover a data breach, it suggests that healthcare is losing the battle. Discover a fundamental approach being advocated by a growing number of healthcare security professionals.

Read More
October 20, 2020
|
By
Vectra

Vectra and Splunk Partner on Mission Control for an Out of this World Launch

Vectra Cognito announces the expansion of the partnership with Splunk as a launch partner for Splunk Mission Control, a cloud-based and future-ready unified security operations platform.

Read More
October 19, 2020
|
By
Vectra

The Office 365 Tools and Open Services Attackers Love to Use

Attackers are using legitimate tools built into Microsoft Office 365 to perform reconnaissance, move laterally, and extend their attacks. OurSpotlight Report on Office 365 identifies what they’re up to and where you should be looking.

Read More
October 19, 2020
|
By
Vectra

攻撃者が使用する Office 365ツールと オープンサービス

90日間、400万件のOffice365アカウントを観察することで、組み込みのOffice 365機能を悪用した攻撃者のテクニックに関連した疑わしくハイリスクな振る舞いを特定することができました。

Read More
October 15, 2020
|
By
Marcus Hartwig

Vectra and CrowdStrike Turn the Tables on Cyberattackers

Learn more about how Vectra’s new Cognito Detect Lockdown feature, made possible by integrating with CrowdStrike Falcon Insight Endpoint Detection and Response (EDR), enables you to automatically thwart cyberattackers on the device level.

Read More
October 14, 2020
|
By
Vectra

Incident Response Maturity and the Roadmap to Success

Discover how maturity and capability can be defined and measured across the five stages of the maturity model based on the desired level of risk awareness.

Read More
October 13, 2020
|
By
Vectra

What We Saw in 90 days from 4 Million Microsoft Office 365 Accounts

Read the Office 365 Spotlight Report to learn about the primary cybersecurity threats that can lead to Office 365 takeovers and breaches.

Read More
October 13, 2020
|
By
Gregory Cardiet

Mit NDR können Sie Ihr SIEM noch besser nutzen (und EDR hilft auch)

Die Kombination von EDR, NDR sowie SIEM bilden die SOC-Transparenz-Triade. Doch auf dem steinigen Weg zur Transparenz im Security Operations Center (SOC) muss man bei der Implementierung von Angriffserkennungstools zahlreiche Hindernisse überwinden.

Read More
October 13, 2020
|
By
Vectra

90日間、400万件のMicrosoft Office 365アカウントから見えてきたこと

Vectra AI社は、2020年Office 365スポットライトレポートを発表しました。レポートでは、Office365に対する主なサイバーセキュリティ攻撃についてまとめています。

Read More
October 8, 2020
|
By
Sam Martin

Fortinet Integration: Advanced Monitoring and NDR with Automated Response

We’re excited to announce a partnership with Fortinet to integrate the Cognito platform and FortiGate next-generation firewalls to detect, respond, and block cyberattacks in cloud, data center, IoT, and enterprise networks.

Read More
October 6, 2020
|
By
Nathan Einwechter

Count Your 16,000 Most Critical Assets? Are You Nuts?

Asset management is one of the toughest challenges IT organizations can face. Discover why the ability to detect threats early on the network is better than ranking your critical systems.

Read More
September 30, 2020
|
By
Vectra

Incident Response and the Need for Speed

A mature incident response process provides the benefit of faster response to reduce the amount of time an attacker has access to organization resources. Discover the metrics security teams can use to measure risk and mitigation.

Read More
September 29, 2020
|
By
Joe Malenfant

The Psychology Behind an Insider Threat

Analyzing the psychology of an insider threat case is a complex task because there is little evidence and scant public data about threat incidents. Develop an improved understanding of the mind of malicious insiders with the multiple life-stage model.

Read More
September 25, 2020
|
By
Gregory Cardiet

NDR Helps You Achieve More from Your SIEM (EDR Helps, Too)

Gregory Cardiet, technical leader for Vectra, shares his thoughts and experiences on why enterprises are increasingly integrating network detection and response (NDR) as a core element of their security operations visibility capabilities.

Read More
September 24, 2020
|
By
Sam Martin

cPacket Networks Integration: Deliver NDR with Fast Forensics

We’re delighted to to announce a new integration between our Cognito platform for NDR and the cPacket Networks visibility solution. The combined techniques provide robust security-response capabilities that track the source, target, and method of attack.

Read More
September 22, 2020
|
By
Stephen Malone

Detecting ZeroLogon with Zero Signatures

The recent ZeroLogon (CVE-2020-1472) vulnerability allows an attacker to gain Domain Admin credentials. The Vectra AI/ML models are designed to detect attacks regardless of tools or signatures and alerted on ZeroLogon even before it was announced.

Read More