blog - author

Chris Morales

Head of Security Analytics at Vectra AI

Christopher Morales is Head of Security Analytics at Vectra, where he advises and designs incident response and threat management programs for Fortune 500 enterprise clients. He has nearly two decades of information security experience in an array of cybersecurity consulting, sales, and research roles. Christopher is a widely respected expert on cybersecurity issues and technologies and has researched, written and presented numerous information security architecture programs and processes.

All blog posts from this author

Threat detection

Bedrohungserkennung und Response mit einer Architektur ohne SIEM

April 5, 2019
Read blog post
Security operations

How to gain visibility into attacker behaviors inside cloud environments

June 10, 2019
Read blog post
Cybersecurity

Visibilité, détection et aide à la résolution des incidents avec une architecture sans outil SIEM

April 30, 2019
Read blog post
Cybersecurity

Threat Behaviors in the Attack Lifecycle

June 20, 2019
Read blog post
Cybersecurity

Ransomware doesn’t discriminate. It only cares about money.

August 7, 2019
Read blog post
Cybersecurity

Comparing Vectra and Verizon threat research

June 18, 2019
Read blog post
Security operations

Vectra is positioned as the sole visionary in the 2018 Gartner Magic Quadrant for IDPS

January 12, 2018
Read blog post
Cybersecurity

BGP hijackers: “This traffic is going to Russia!”

December 14, 2017
Read blog post
Cybersecurity

An analysis of the Shamoon 2 malware attack

February 7, 2017
Read blog post
Threat detection

Vectra seul éditeur « visionnaire » du MQ 2018 de Gartner dans la catégorie IDPS

January 18, 2018
Read blog post
Cybersecurity

Im Jahr 2022 ist der UEBA-Markt Geschichte

January 31, 2017
Read blog post
Cybersecurity

Enquête de la conférence Black Hat 2018: le temps et les compétences avant tout

September 20, 2018
Read blog post
Threat detection

Alarmierende Zunahme des Minings für Kryptowährungen an Hochschulen

May 14, 2018
Read blog post
Security operations

Mensch + Maschine: Im Kampf gegen Cyber-Threats

February 27, 2018
Read blog post
Infrastructure

Vectra ist der einzige Visionär im Gartner Magic Quadrant 2018 für IDPS

January 15, 2018
Read blog post
Cybersecurity

Shamoon 2: Same or better than the original?

January 28, 2017
Read blog post
Cybersecurity

The UEBA market will be gone by 2022

January 11, 2017
Read blog post
Breach

Encrypt everything. Don’t let security be the reason you don’t (and attackers do)

December 15, 2016
Read blog post
Infrastructure

Cyberattack of the clones

November 27, 2016
Read blog post
Cybersecurity

Confronting risk and exposure in healthcare networks

April 24, 2019
Read blog post
Cybersecurity

Most attacks against energy and utilities occur in the enterprise IT network

November 1, 2018
Read blog post
Security operations

2018 Black Hat Superpower Survey: It's about time and talent

August 22, 2018
Read blog post
Threat detection

Cyberattack detections from more than 250 Vectra customers with over 4 million devices and workloads

August 8, 2018
Read blog post
Cybersecurity

The alarming surge in cryptocurrency mining on college campuses

March 29, 2018
Read blog post
Cybersecurity

Gain Visibility and Automate Threat Hunting in the Cloud with Gigamon and Vectra

September 13, 2017
Read blog post
Infrastructure

How AI detects and mitigates cyber attacks in software-defined data centers

June 23, 2017
Read blog post
Breach

A behind-the-scenes look at how cybercriminals carry out attacks inside enterprise networks

June 14, 2017
Read blog post
Breach

Vectra detection and response to WannaCry ransomware

May 16, 2017
Read blog post
Cybersecurity

Fighting the ransomware pandemic

May 13, 2017
Read blog post
Artificial Intelligence

How to win the cybersecurity battle in healthcare

May 4, 2017
Read blog post
Artificial Intelligence

AI: Is science fiction on a collision course with science fact?

March 30, 2017
Read blog post
Cybersecurity

Healthcare is one of cybercrime’s most targeted sectors

January 26, 2017
Read blog post
Artificial Intelligence

A sinuous journey through ``tensor_forest``

December 11, 2017
Read blog post
Infrastructure

The imminent threat against industrial control systems

November 30, 2017
Read blog post
Cybersecurity

Man + machine is the winning combo for combating cyber threats

August 10, 2017
Read blog post
Cybersecurity

Goldeneye. Petya. WannaCry. It's all ransomware.

June 28, 2017
Read blog post
Security operations

Don't let your cybersecurity vendor leave you vulnerable

March 23, 2017
Read blog post
Cybersecurity

Splunk integration: A deep dive into the adaptive security architecture

February 9, 2017
Read blog post
Security operations

Turning a Webcam Into a Backdoor

January 12, 2016
Read blog post
Cybersecurity

Vectra Threat Labs discovers vulnerabilities in Adobe Reader and Internet Explorer

October 14, 2015
Read blog post
Cybersecurity

Belkin F9K1111 V1.04.10 Firmware Analysis

August 19, 2015
Read blog post
Cybersecurity

Microsoft Internet Explorer 11 Zero-day

July 14, 2015
Read blog post
Cybersecurity

Visibility, detection and response using a SIEM-less architecture

March 20, 2019
Read blog post