Vectra

Cybersecurity

Vectra® is the world leader in AI-powered network detection and response.

All blog posts from this author

Industry

The Office 365 Tools and Open Services Attackers Love to Use

October 19, 2020
Read blog post
Threat detection

How Attackers Use Business Email to Compromise Office 365

December 3, 2020
Read blog post
Industry

What We Saw in 90 days from 4 Million Microsoft Office 365 Accounts

October 13, 2020
Read blog post
Artificial Intelligence

Insider Threats Detection: Common Indicators & Prevention Strategies

January 10, 2015
Read blog post
Threat detection

Using Vectra to Detect and Stop Maze Ransomware

August 5, 2020
Read blog post
Industry

The Sizable Risk of Cyber Well-being in Healthcare

June 30, 2020
Read blog post
Security operations

Incident Response and the Need for Speed

September 30, 2020
Read blog post
Security operations

Incident Response Maturity and the Roadmap to Success

October 14, 2020
Read blog post
Industry

How to Win the Cybersecurity Battle in Healthcare

October 20, 2020
Read blog post
Integration

Vectra and Splunk Partner on Mission Control For an Out of this World Launch

October 20, 2020
Read blog post
Security operations

Incident Response and Knowing When to Automate

October 28, 2020
Read blog post
Security operations

The Business of Ransomware is Changing—Detection and Response Needs to Change Too

November 5, 2020
Read blog post
Cybersecurity

Beware of Malicious Websites and Using Identical Passwords this Holiday Season

December 10, 2020
Read blog post
Security research

SUNBURST & The World’s Largest Supply Chain Cyber Attack | Vectra AI

February 17, 2021
Read blog post
Security operations

Chronicle integration: Conduct faster, context-driven investigations into active cyberattacks with Vectra and Chronicle

November 19, 2019
Read blog post
Security operations

Swimlane integration: Automate response and speed remediation with Swimlane and Vectra

November 11, 2019
Read blog post
Security operations

Forescout integration: Gain real-time visibility and automated response

November 4, 2019
Read blog post
Security operations

Check Point integration: Gain continuous threat visibility and enforcement

October 28, 2019
Read blog post
Industry

90日間、400万件のMicrosoft Office 365アカウントから見えてきたこと

October 13, 2020
Read blog post
Cybersecurity

2つのケーススタディ:Microsoft Office 365 のセキュリティ

October 26, 2020
Read blog post
Threat detection

攻撃者がビジネスメールを使ってOffice 365を侵害する方法

December 3, 2020
Read blog post
Industry

攻撃者が使用するOffice 365ツールとオープンサービス

October 19, 2020
Read blog post
Infrastructure

BGP-Piraten: “… und dieser Traffic geht nach Russland!“

December 20, 2017
Read blog post
Cybersecurity

Sicherheitslücke Smartphone

March 8, 2016
Read blog post
Security operations

Remote Work, Not Remote Control

March 25, 2020
Read blog post
Cybersecurity

Maschinelles Lernen gegen Insider Threats

December 14, 2015
Read blog post
Security operations

Statement zum aktuellen BSI Bericht zur Lage der IT-Sicherheit in Deutschland 2015

November 20, 2015
Read blog post
Artificial Intelligence

Deep Learning in der Cybersicherheit

August 22, 2017
Read blog post
Breach

Petya: Cyberkriminelle lernen voneinander, Unternehmen sollten dies auch tun

June 28, 2017
Read blog post
Cybersecurity

Mangel an IT-Sicherheitsexperten spitzt sich zu

June 13, 2017
Read blog post
Threat detection

US-Wahl 2016: Pfusch beim Umgang mit Big Data

November 18, 2016
Read blog post
Breach

Ransomware-Angriffe – Unvorbereitete Unternehmen zahlen hohen Preis

October 25, 2016
Read blog post
Infrastructure

Wie man Angriffserkennung ins Rechenzentrum bringt

September 27, 2016
Read blog post
Infrastructure

Vectra Networks – Neue Partnerschaften helfen Kunden Sicherheitslücken zu schließen

August 12, 2016
Read blog post
Breach

Digitale Vernetzung erleichtert Hackern Angriff auf unsere Daten

April 22, 2016
Read blog post
Breach

Algorithmen als Schlüssel effektiver Hackerangriff-Erkennung

February 15, 2016
Read blog post
Cybersecurity

ホリデーシーズンは悪質なウェブサイトに特にご注意を

December 10, 2020
Read blog post
Security research

SUNBURST問題まとめ:既存のアクセスモデルによる世界最大のサプライチェーン攻撃の経緯

February 17, 2021
Read blog post
Cybersecurity

Most attacks against energy and utilities occur in the enterprise IT network

November 1, 2018
Read blog post
Security operations

2018 Black Hat Superpower Survey: It's about time and talent

August 22, 2018
Read blog post
Threat detection

Cyberattack detections from more than 250 Vectra customers with over 4 million devices and workloads

August 8, 2018
Read blog post
Cybersecurity

The alarming surge in cryptocurrency mining on college campuses

March 29, 2018
Read blog post
Security operations

Vectra is positioned as the sole visionary in the 2018 Gartner Magic Quadrant for IDPS

January 12, 2018
Read blog post
Cybersecurity

BGP hijackers: “This traffic is going to Russia!”

December 14, 2017
Read blog post
Artificial Intelligence

A sinuous journey through ``tensor_forest``

December 11, 2017
Read blog post
Infrastructure

The imminent threat against industrial control systems

November 30, 2017
Read blog post
Cybersecurity

Gain Visibility and Automate Threat Hunting in the Cloud with Gigamon and Vectra

September 13, 2017
Read blog post
Cybersecurity

Man + machine is the winning combo for combating cyber threats

August 10, 2017
Read blog post
Cybersecurity

Goldeneye. Petya. WannaCry. It's all ransomware.

June 28, 2017
Read blog post
Infrastructure

How AI detects and mitigates cyber attacks in software-defined data centers

June 23, 2017
Read blog post
Breach

A behind-the-scenes look at how cybercriminals carry out attacks inside enterprise networks

June 14, 2017
Read blog post
Breach

Vectra detection and response to WannaCry ransomware

May 16, 2017
Read blog post
Cybersecurity

Fighting the ransomware pandemic

May 13, 2017
Read blog post
Artificial Intelligence

AI: Is science fiction on a collision course with science fact?

March 30, 2017
Read blog post
Security operations

Don't let your cybersecurity vendor leave you vulnerable

March 23, 2017
Read blog post
Cybersecurity

Splunk integration: A deep dive into the adaptive security architecture

February 9, 2017
Read blog post
Cybersecurity

An analysis of the Shamoon 2 malware attack

February 7, 2017
Read blog post
Cybersecurity

Shamoon 2: Same or better than the original?

January 28, 2017
Read blog post
Cybersecurity

Healthcare is one of cybercrime’s most targeted sectors

January 26, 2017
Read blog post
Cybersecurity

The UEBA market will be gone by 2022

January 11, 2017
Read blog post
Breach

Encrypt everything. Don’t let security be the reason you don’t (and attackers do)

December 15, 2016
Read blog post
Infrastructure

Cyberattack of the clones

November 27, 2016
Read blog post
Security operations

Turning a Webcam Into a Backdoor

January 12, 2016
Read blog post
Cybersecurity

Vectra Threat Labs discovers vulnerabilities in Adobe Reader and Internet Explorer

October 14, 2015
Read blog post
Cybersecurity

Belkin F9K1111 V1.04.10 Firmware Analysis

August 19, 2015
Read blog post
Cybersecurity

Microsoft Internet Explorer 11 Zero-day

July 14, 2015
Read blog post
Cybersecurity

Enquête de la conférence Black Hat 2018: le temps et les compétences avant tout

September 20, 2018
Read blog post
Threat detection

Vectra seul éditeur « visionnaire » du MQ 2018 de Gartner dans la catégorie IDPS

January 18, 2018
Read blog post
Threat detection

Alarmierende Zunahme des Minings für Kryptowährungen an Hochschulen

May 14, 2018
Read blog post
Security operations

Mensch + Maschine: Im Kampf gegen Cyber-Threats

February 27, 2018
Read blog post
Infrastructure

Vectra ist der einzige Visionär im Gartner Magic Quadrant 2018 für IDPS

January 15, 2018
Read blog post
Cybersecurity

Im Jahr 2022 ist der UEBA-Markt Geschichte

January 31, 2017
Read blog post
Cybersecurity

Visibility, detection and response using a SIEM-less architecture

March 20, 2019
Read blog post
Cybersecurity

Confronting risk and exposure in healthcare networks

April 24, 2019
Read blog post
Security operations

How to gain visibility into attacker behaviors inside cloud environments

June 10, 2019
Read blog post
Cybersecurity

Comparing Vectra and Verizon threat research

June 18, 2019
Read blog post
Cybersecurity

Threat Behaviors in the Attack Lifecycle

June 20, 2019
Read blog post
Cybersecurity

Visibilité, détection et aide à la résolution des incidents avec une architecture sans outil SIEM

April 30, 2019
Read blog post
Threat detection

Bedrohungserkennung und Response mit einer Architektur ohne SIEM

April 5, 2019
Read blog post
Cybersecurity

Ransomware doesn’t discriminate. It only cares about money.

August 7, 2019
Read blog post
Integration

Cybereasonとの連携:完全な可視化と素早い対応を可能に

February 25, 2020
Read blog post
Threat detection

特権アクセス分析

September 9, 2019
Read blog post
Security operations

CrowdStrike、Splunk、Vectra AI社 – サイバー攻撃の検知と阻止に向けた、3社による強力な施策

September 17, 2019
Read blog post
Cybersecurity

Achieving Threat Hunting Consistency with the MITRE ATT&CK Matrix

December 13, 2019
Read blog post
Cybersecurity

Die Top 5 der Vorgehensweisen beim Lateral Movement

May 27, 2019
Read blog post
Breach

Wie IoT Cyberangriffen Tür und Tor öffnen kann

November 17, 2015
Read blog post
Breach

Hat Sandboxing als Hacker-Abwehr ausgedient?

April 18, 2016
Read blog post
Breach

The new vulnerability that creates a dangerous watering hole in your network

July 12, 2016
Read blog post
Cybersecurity

What’s an adaptive security architecture and why do you need it?

February 2, 2017
Read blog post
Threat detection

Automate to optimise your security teams

January 4, 2016
Read blog post
Threat detection

Roundtable roundup from the European Information Security Summit

February 23, 2017
Read blog post
Artificial Intelligence

(Artificial) Intelligence on the EU GDPR

July 3, 2017
Read blog post
Integration

Vendor Collaboration in the Cybersecurity Industry is Essential (and Our Customers Deserve It)

July 28, 2020
Read blog post
Security operations

Vectra SaaS Detections – Office 365

February 11, 2020
Read blog post
Threat detection

Machine learning: The cornerstone of Network Traffic Analytics (NTA)

January 26, 2019
Read blog post
Cybersecurity

Breaking ground: Understanding and identifying hidden tunnels

July 11, 2018
Read blog post
Breach

Giving incident responders deeper context about what happened

June 4, 2018
Read blog post
Threat detection

Attackers can use your admin tools to spy, spread, and steal

January 26, 2018
Read blog post
Infrastructure

Bolstering the blue team

November 19, 2017
Read blog post
Security operations

Fatal SIEM flaw: No body, no murder

November 7, 2017
Read blog post