Matthew Pieklik

Senior Consulting Analyst

Matthew Pieklik is a senior consulting analyst at Vectra. He studied computer science at the University at Buffalo. Prior to Vectra, he was a senior systems engineer at Juniper Networks and a senior security engineer at RigNet amongst other positions held in his 20+ year career in networking and security.

All blog posts from this author

Threat detection

Top Cloud Threat Detections For Microsoft Azure AD & O365

May 19, 2021
Read blog post
Threat detection

Microsoftクラウド環境における「普通ではない」を検知する

May 19, 2021
Read blog post
Breach

Supply Chain Attacks: Spotting & Preventing Supply Chain Attacks

May 26, 2021
Read blog post
Cybersecurity

Is there still value in JA3 fingerprinting?

March 11, 2020
Read blog post

Matthew Pieklik

Senior Consulting Analyst

Matthew Pieklik is a senior consulting analyst at Vectra. He studied computer science at the University at Buffalo. Prior to Vectra, he was a senior systems engineer at Juniper Networks and a senior security engineer at RigNet amongst other positions held in his 20+ year career in networking and security.

Posts from

Matthew Pieklik

May 26, 2021
|
By
Matthew Pieklik
The Supply Chain’s Broken Link—Identifying and Preventing Supply Chain Attacks

Supply chain attacks represent an appealing opportunity for attackers. See why this type of attack is gaining in popularity and what defenders need to know to keep their organization safe.

Read More
May 26, 2021
|
By
Matthew Pieklik
サプライチェーンの攻撃を特定し、防止するために

なぜ攻撃者はサプライチェーン攻撃を行うのでしょうか?現在どのような攻撃や侵害に注目が集まっているのか、さらに組織を守るには何が必要なのかご紹介します。

Read More
May 19, 2021
|
By
Matthew Pieklik
Detecting the “Out of the Ordinary” in Your Microsoft Cloud Environment

In our latest Spotlight Report, see how the Top 10 Threat Detections seen across Microsoft Azure AD and Office 365 allow security teams to detect infrequent behavior that is abnormal or unsafe across their environments.

Read More
May 19, 2021
|
By
Matthew Pieklik
Microsoftクラウド環境における「普通ではない」を検知する

最新のスポットライトレポートでは、MicrosoftのAzure ADとOffice365で見られる脅威トップ10によって、環境全体においてセキュリティチームが異常もしくは安全と判断する方法を紹介しています。

Read More