A major apprenticeship program from the US government could fill vacant cybersecurity jobs - and we're here for it.
Read More
Hitesh Sheth
President and CEO at Vectra AI
Hitesh Sheth is the president and CEO of Vectra. Previously, he held the position of chief operating officer at Aruba Networks. Hitesh joined Aruba from Juniper Networks, where he was EVP/GM for its switching business and before that, SVP for the Service Layer Technologies group, which included security. Prior to Juniper, he held a number of senior management positions in the switching organization at Cisco, including running its metro Ethernet business. Before Cisco, he held executive and engineering management positions at Liberate Technologies and Oracle Corporation. He started his career as a Unix programmer at the Santa Cruz Operation. Hitesh holds a BA degree in Computer Science from the University of Texas at Austin.
Posts from
Hitesh Sheth


There should be fresh scrutiny of SaaS subscription relationships, and the security policies of managed service providers; you're only as secure as your provider.
Read More
Every year, this global retail giant in the beauty industry failed to pass red team exercises-until they deployed Vectra. Get the full story on how they use the Cognito platform to pass Red Team testing and ensure the overall security of its data.
Read More
For us as Vectra, equality and inclusivity are key components of our culture. This International Women's Day, we want to celebrate the women in cybersecurity and highlight the opportunities available in the industry.
Read More
The pandemic has made threat actors eager to exploit information about COVID-19. Find out how an ordinary LinkedIn message set off a chain reaction that escalated into a widespread, sophisticated attack at one of the world's leading pharmaceutical companies.
Read More
Today, I am thrilled to share the news that Vectra has completed a $100 million Series E funding round led by TCV, one of the largest growth equity firms backing private and public technology companies.
Read More
The security industry is rampant with vendors peddling anomaly detection as the cure all for cyberattacks. This is grossly misleading. The problem is that anomaly detection over-generalizes: All normal behavior is good; all anomalous behavior is bad-without considering gradations and context. With anomaly detection, the distinction between user behaviors and attacker behaviors is nebulous, even though they are fundamentally different.
Read More
Keeping data from getting out into the wild or being damaged by cyber attackers is what keeps CISOs, the executive team and boards of directors up at night. To protect organizations, cybersecurity needs to be automated and real-time, it needs to learn contextually like we do and it needs to monitor for threats at every corner of the network in a way that organizations can afford without sacrificing coverage.
Read More
Over the last week, we have seen Russia use a combination of tactics in warfare that has not been seen before. From the use of cellular telephone networks for distribution of information that was designed to incite panic among the general population to manipulation of enterprise networks and computers to disrupt critical government departments and private industry. Vladimir Putin has proven that there are no boundaries that he is unwilling to cross when it comes to promoting his self-serving view of the world.
Read More