Welcome to the
Vectra Blog

Featured blog posts

Here We Go Again....One Week After the Colonial Pipeline Attack, More Ransomware

By:

Tim Wade

May 17, 2021

Just a week after the Colonial Pipeline was shut down due to ransomware—attackers are at it again. It’s now being reported that Ireland’s health service shut down its IT systems and a company in Germany had to fork out a $4.4 million ransom on the same day.

Read blog post
Tim Wade

How a Global Retailer Passed Red Team Tests with Vectra

By:

Hitesh Sheth

April 30, 2021

Every year, this global retail giant in the beauty industry failed to pass red team exercises—until they deployed Vectra. Get the full story on how they use the Cognito platform to pass Red Team testing and ensure the overall security of its data.

Read blog post
Hitesh Sheth

Threat Detection and Response for Everywhere the Adversaries Go

By:

Jose Malacara

April 22, 2021

We’re excited to announce extended EDR native integration support in the Cognito platform! Find out how you can benefit from these simple, seamless integrations for comprehensive coverage across the enterprise, IoT devices, hybrid cloud, and cloud environments.

Read blog post
Jose Malacara

Today’s Security Forecast: Cloudy with a Chance of Account Takeovers

By:

Tim Wade

March 24, 2021

Account takeovers and identity-based attacks are on the rise, with Microsoft Office 365 at the heart of these threats. Find out what concerns are top of mind for IT decision makers when it comes to Office 365 security and protecting data in the cloud.

Read blog post
Tim Wade

All blog posts

by topic

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

by author

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

by language

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

by date

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Achieve Zero Trust Access Visibility with Zscaler and Vectra

By:
Sam Martin
May 18, 2021

We’re excited to announce a new integration with Zscaler! Find out how this integration with Cognito Detect provides end-to-end access visibility and protection for remote workers and business-critical applications.

Read blog post
Integration
Sam Martin
English
2021

Here We Go Again....One Week After the Colonial Pipeline Attack, More Ransomware

By:
Tim Wade
May 17, 2021

Just a week after the Colonial Pipeline was shut down due to ransomware—attackers are at it again. It’s now being reported that Ireland’s health service shut down its IT systems and a company in Germany had to fork out a $4.4 million ransom on the same day.

Read blog post
Cybersecurity
Tim Wade
English
2021

The Best Way to Stay Breached

By:
Henrik Davidsson
May 13, 2021

Cyberattacks are hitting the headlines around the world and there seems to be no end to the noise the attacks are making. We dive into what an organisation should do to stay breached.

Read blog post
Breach
Henrik Davidsson
English
2021

Azure AD Attackers Beware - Vectra Sees You

By:
John Mancini
May 6, 2021

The Vectra Cognito Azure AD Privilege Anomaly Detection is a radical step forward when detecting account takeover events targeting Azure AD to gain access to mission-critical SaaS applications. With it, teams are alerted, and attacks can be stopped before they cause harm.

Read blog post
Threat detection
John Mancini
English
2021

How a Global Retailer Passed Red Team Tests with Vectra

By:
Hitesh Sheth
April 30, 2021

Every year, this global retail giant in the beauty industry failed to pass red team exercises—until they deployed Vectra. Get the full story on how they use the Cognito platform to pass Red Team testing and ensure the overall security of its data.

Read blog post
Cybersecurity
Hitesh Sheth
English
2021

Command and Control (C2) Evasion Techniques, Part 2

By:
Joshua St. Hilaire
April 26, 2021

Network and endpoint defense technologies will have to either rapidly update signatures or use other investigative ways to detect command and control (C2). Uncover how threat actors evade security tools to execute C2 techniques to learn about what you should look for.

Read blog post
Security research
Joshua St. Hilaire
English
2021

Threat Detection and Response for Everywhere the Adversaries Go

By:
Jose Malacara
April 22, 2021

We’re excited to announce extended EDR native integration support in the Cognito platform! Find out how you can benefit from these simple, seamless integrations for comprehensive coverage across the enterprise, IoT devices, hybrid cloud, and cloud environments.

Read blog post
Integration
Jose Malacara
English
2021

Spot, Stop, and Lock It with Vectra

By:
Niall Errity
March 30, 2021

Find out how Vectra’s native integrations with Microsoft and AWS enable security teams to automatically contain events directly from the Cognito platform.

Read blog post
Security operations
Niall Errity
English
2021

Vectra Honored with CRN’s Prestigious 5-Star Partner Program Rating

By:
Marc Gemassmer
March 29, 2021

Vectra is honored to receive recognition from CRN by honoring the Vectra Partner Program with its prestigious 5-Star Partner Program Rating. We couldn’t be more thrilled about this award and our amazing partner community.

Read blog post
Marc Gemassmer
English
2021