blog - author

Vectra

Cybersecurity

Vectra® is the world leader in AI-powered network detection and response.

All blog posts from this author

Cybersecurity

Breaking ground: Understanding and identifying hidden tunnels

July 11, 2018
Read blog post
Breach

Giving incident responders deeper context about what happened

June 4, 2018
Read blog post
Threat detection

Attackers can use your admin tools to spy, spread, and steal

January 26, 2018
Read blog post
Infrastructure

Bolstering the blue team

November 19, 2017
Read blog post
Security operations

Fatal SIEM flaw: No body, no murder

November 7, 2017
Read blog post
Breach

WannaCry still lingering

August 24, 2017
Read blog post
Artificial Intelligence

Security that thinks is now thinking deeply

April 26, 2017
Read blog post
Cybersecurity

What’s an adaptive security architecture and why do you need it?

February 2, 2017
Read blog post
Security operations

Security automation isn't AI security

January 17, 2017
Read blog post
Artificial Intelligence

Politics and the bungling of big data

November 17, 2016
Read blog post
Cybersecurity

InfoSec skills shortage: The No. 1 threat to Internet security

November 15, 2016
Read blog post
Cybersecurity

Moonlight – Targeted attacks in the Middle East

October 26, 2016
Read blog post
Cybersecurity

Triggering MS16-030 via targeted fuzzing

October 11, 2016
Read blog post
Infrastructure

Exploiting the firewall beachhead: A history of backdoors into critical infrastructure

September 28, 2016
Read blog post
Cybersecurity

Bringing attack detections to the data center

September 13, 2016
Read blog post
Cybersecurity

From the Iron Age to the “Machine Learning Age”

August 30, 2016
Read blog post
Breach

The new vulnerability that creates a dangerous watering hole in your network

July 12, 2016
Read blog post
Cybersecurity

Time to update how we manage and address malware infections

June 28, 2016
Read blog post
Cybersecurity

Ransomware, encryption and machine learning – Three key takeaways from Infosecurity 2016

June 15, 2016
Read blog post
Breach

Ransomware lessons from Julius Caesar

June 7, 2016
Read blog post
Threat detection

DPI goes blind as encryption adoption increases

June 1, 2016
Read blog post
Cybersecurity

Introducing the Spring 2016 Post-Intrusion Report

April 20, 2016
Read blog post
Breach

Canary in the ransomware mine

March 30, 2016
Read blog post
Cybersecurity

Plan on losing visibility of your network traffic: Steps to take control

March 8, 2016
Read blog post
Cybersecurity

Apple vs. the FBI: Some points to consider

February 18, 2016
Read blog post
Cybersecurity

The Chocolate Sprinkles of InfoSec

February 2, 2016
Read blog post
Cybersecurity

Who is watching your security technology?

January 28, 2016
Read blog post
Cybersecurity

Blocking Shodan

January 20, 2016
Read blog post
Threat detection

Will IDS ever be able to detect intrusions again?

November 3, 2015
Read blog post
Threat detection

A revolutionary new approach to detecting malicious covert communications

October 28, 2015
Read blog post
Cybersecurity

Takeaways from Gartner Security and Risk Management UK

October 12, 2015
Read blog post
Infrastructure

The Impact of IoT on Your Attack Surface

September 29, 2015
Read blog post
Cybersecurity

Cybersecurity and machine learning: The right features can lead to success

September 15, 2015
Read blog post
Threat detection

The industry needs a real alternative to signatures

September 9, 2015
Read blog post
Breach

Is your thermostat spying? Cyberthreats and the Internet of Things

July 13, 2015
Read blog post
Threat detection

Think outside the sandbox

July 8, 2015
Read blog post
Cybersecurity

What cyberthreats are lurking about in your network?

June 23, 2015
Read blog post
Cybersecurity

Duqu: The Sequel

June 12, 2015
Read blog post
Cybersecurity

Insider threats surge while budgets retreat

June 4, 2015
Read blog post
Artificial Intelligence

Automate detection of cyberthreats in real time. Why wait?

May 15, 2015
Read blog post
Cybersecurity

Cybersecurity, data science and machine learning: Is all data equal?

May 9, 2015
Read blog post
Breach

Dyre Malware Games the Test

May 7, 2015
Read blog post
Cybersecurity

Big Data Sends Cybersecurity Back to the Future

April 1, 2015
Read blog post
Artificial Intelligence

Do you know how to protect your key assets?

March 27, 2015
Read blog post
Cybersecurity

Creating cybersecurity that thinks

March 9, 2015
Read blog post
Cybersecurity

Superfish: When Bloatware Goes Bad

March 4, 2015
Read blog post
Breach

Cyberattackers Are Digital Termites

March 1, 2015
Read blog post
Artificial Intelligence

The Carbanak APT - Redefining Banking Malware

February 19, 2015
Read blog post
Breach

The Anthem Breach and Security Going Forward

February 6, 2015
Read blog post
Artificial Intelligence

Detecting the Insider Threat – how to find the needle in a haystack?

January 10, 2015
Read blog post
Cybersecurity

Morgan Stanley Meets the Insider Threat

January 6, 2015
Read blog post
Cybersecurity

Malicious Insider Psychology – when the personal bubble bursts

December 22, 2014
Read blog post
Cybersecurity

Malicious Insider Psychology – when pressure builds up in the Fraud Triangle

December 13, 2014
Read blog post
Cybersecurity

Community Threat Analysis Uncovers Insider Attacks

December 10, 2014
Read blog post
Infrastructure

Insider attacks pose a serious threat to critical U.S. infrastructure

December 7, 2014
Read blog post
Breach

Applying Vectra to the Regin Malware

December 3, 2014
Read blog post
Cybersecurity

Insider Threats - the myth of the black swan

November 30, 2014
Read blog post
Cybersecurity

Insider Threats - how they affect US companies

November 22, 2014
Read blog post
Cybersecurity

Insider Threats - is your organization safe?

November 16, 2014
Read blog post
Cybersecurity

Insiders – Threat or Blessing?

November 12, 2014
Read blog post
Threat detection

Attackers Lurk in my Network, but Nothing Reports it

November 10, 2014
Read blog post
Breach

Vectra detections will enable Juniper to block cyberattacks via API

September 9, 2014
Read blog post
Breach

Packet Pushers Shines Critical Light on New Cybersecurity Solution

August 14, 2014
Read blog post
Infrastructure

Reducing the Cybersecurity Risk for BYOD – Can you have your gadgets and use them too?

August 1, 2014
Read blog post
Cybersecurity

The Hidden Risk of Not Detecting Bitcoin Mining

June 6, 2014
Read blog post
Breach

Are We Secure?

May 28, 2014
Read blog post
Breach

Responding to a Priority One Malware Attack

May 7, 2014
Read blog post
Infrastructure

I'll Have Two BYOD and One Mobile, Hold the Malware Threats Please

April 29, 2014
Read blog post
Breach

Finding Signals in Security's White Noise

April 22, 2014
Read blog post
Breach

Does Your Security Architecture Adapt to Changing Threats?

March 25, 2014
Read blog post
Infrastructure

Vos outils d’administration sont exploités par les cyberpirates

January 30, 2018
Read blog post
Cybersecurity

Je suis Cognito, l'intelligence artificielle au service de votre SOC

November 21, 2017
Read blog post
Breach

Angreifer kapern Admin-Tools – für Spionage, Infiltration & Diebstahl

February 7, 2018
Read blog post
Security operations

Ich bin Cognito und unterstütze Ihr Abwehrteam (blue team)

December 4, 2017
Read blog post
Security operations

Ohne Leiche kein Verbrechen: Die fatale Schwäche des SIEM-Konzepts

November 17, 2017
Read blog post
Cybersecurity

Fachkräftemangel im InfoSec-Bereich: Die Bedrohung Nummer eins der Internetsicherheit

November 25, 2016
Read blog post
Cybersecurity

Lurking in the shadows: Top 5 lateral spread threat behaviors

April 1, 2019
Read blog post
Cybersecurity

Why network metadata is just right for your data lake

April 30, 2019
Read blog post
Security operations

Three cornerstones of the SOC nuclear triad

May 7, 2019
Read blog post
Cybersecurity

Not all data is created the same

May 21, 2019
Read blog post
Cybersecurity

Die Top 5 der Vorgehensweisen beim Lateral Movement

May 27, 2019
Read blog post
Cybersecurity

Tapis dans l'ombre : les cinq principaux comportements malveillants de propagation latérale

June 4, 2019
Read blog post
Cybersecurity

Encrypted command and control: Can you really cover your tracks?

July 16, 2019
Read blog post
Security operations

Notable insights from the Gartner Market Guide for Intrusion Detection and Prevention Systems

July 23, 2019
Read blog post
Cybersecurity

Survival guide: Being secure at Black Hat 2019

July 25, 2019
Read blog post
Security operations

CrowdStrike, Splunk and Vectra – A powerful triad to find and stop cyberattacks

September 17, 2019
Read blog post
Threat detection

Privileged Access Analytics

September 9, 2019
Read blog post
Cybersecurity

Vectra integrates AI-driven network threat detection and response with AWS VPC Ingress Routing

December 3, 2019
Read blog post
Cybersecurity

Achieving threat-hunting consistency with the MITRE ATT&CK Matrix

December 13, 2019
Read blog post
Security operations

CrowdStrike、Splunk、Vectra AI社 – サイバー攻撃の検知と阻止に向けた、3社による強力な施策

September 17, 2019
Read blog post
Threat detection

特権アクセス分析

September 9, 2019
Read blog post
Security operations

Vectra SaaS detections – Office 365

February 11, 2020
Read blog post
Integration

Cybereason integration: Obtain full visibility and faster responses

February 25, 2020
Read blog post
Cybersecurity

Vectra + Sentinel One

February 26, 2020
Read blog post
Cybersecurity

Vectra AI社が、AI駆動型ネットワーク上の脅威検知と対応ソリューションをAWS VPC Ingress Routingと統合

December 3, 2019
Read blog post
Security operations

認証情報を盗難のリスクに晒すDridexが再浮上

December 17, 2019
Read blog post
Cybersecurity

MITRE ATT&CK Matrix を使用した一貫性ある脅威ハンティングの実現

December 13, 2019
Read blog post
Security operations

Vectra製品のSaaS対応-Office 365

February 11, 2020
Read blog post