Latest blog posts

All blog posts

by topic

Select topic(s)

by product

Select product(s)
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

by author

Select author(s)
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

by language

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

by date

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Vectra Integrates Game-Changing Attack Signal Intelligence™ into Amazon Security Lake
November 30, 2022
|
By
Gearóid Ó Fearghaíl

Vectra Integrates Game-Changing Attack Signal Intelligence™into Amazon Security Lake

What do you need to know following the announcement of the integration of Vectra’s Attack Signal Intelligence into Amazon Security Lake?

Read More
AI Helps Detect Evasive Cyberattackers
November 29, 2022
|
By
Willem Hendrickx

AI Helps Detect Evasive Cyberattackers

Modern cyber threats are increasingly evasive and difficult to detect. Vectra offers a new AI-driven solution: Attack Signal Intelligence.

Read More
Who Holds Accountability for Cyberattacks on Retail
November 22, 2022
|
By
Jesse Kimbrel

Who Holds Accountability for Cyberattacks on Retail

When we enter our names, addresses, phone numbers, emails and credit card info — personally identifiable information (PII) — whose job is it to make sure that the information remains safe and not in the wrong hands? The retailer? The consumer?

Read More
What Are the Types of Ransomware Attacks?
November 21, 2022
|
By
Jonathan Barrett

What Are the Types of Ransomware Attacks?

Ransomware is a common type of cyber attack that may target individuals and businesses alike. Device users of any kind must be aware of the different types of ransomware attacks and how to prevent them.

Read More
Detecting Cyberattacks Before They Succeed
November 18, 2022
|
By
Stijn Rommens

Detecting Cyberattacks Before They Succeed

Cyberattacks are still on the rise. Learn more about the problem of preventive cybersecurity and what needs to be changed.

Read More
Vectra Managed Detection and Response (MDR) Shared Responsibility Model
November 14, 2022
|
By
Thomas Patterson

Vectra Managed Detection and Response (MDR) Shared Responsibility Model

In terms of delivering Managed Detection and Response (MDR), we view the term ‘shared responsibility’ differently than some.  It is more about collaboration than delineation. It is about how Vectra, and our customers work together in a seamless manner to resolve threats.

Read More
OpenSSL Security Advisory
November 1, 2022
|
By
Luke Richards

OpenSSL Security Advisory

On November 1st 2022, after teasing the main show the week before, OpenSSL released their advisory describing two risks to OpenSSL 3.0.0 – 3.0.6. This was originally teased as a Critical level alert, which would have been the first Critical since 2015, however this was downgraded to a High owing to what OpenSSL describe as “mitigating factors”.

Read More
Breaking Through Alert Noise to Stop Cyberattacks Before They Become Breaches
October 27, 2022
|
By
Aaron Turner

Breaking Through Alert Noise to Stop Cyberattacks Before They Become Breaches

Vectra SaaS CTO, Aaron Turner shares how to fix overwhelming security alerts that can cause your SOC team to miss critical threats. See how.

Read More
Attack Signal Intelligence Commits to Erasing Unknown Threats in Your Organization
October 12, 2022
|
By
Kevin Kennedy

Vectra Attack Signal Intelligence (ASI)

72% of security practitioners “think they may have been breached, but don’t knowit.” Said differently, nearly three-quarters of security teams don’t know wherethey are compromised right now.

Read More
More or less of the same at the Gartner Security and Risk Summit 
September 20, 2022
|
By
Mark Wojtasiak

More or less of the same at the Gartner Security and Risk Summit 2022

Last week I attended the Gartner Security and Risk Summit in London. The theme of the summit was Accelerating the Evolution of Security: Reframe and Simplify.  From the very first keynote, Gartner laid down the gauntlet. "Change is needed and we must stop doing what we have always done and start learning from our mistakes.”  It is this very sentiment that set the tone for the show.  

Read More
XDR - Erase the unknowns with eco-system solutions that deliver coverage, clarity and control
September 19, 2022
|
By
Jose Malacara

XDR - Erase the unknowns with eco-system solutions that deliver coverage, clarity and control

Native integration delivers Vectra’s patented Security AI to CrowdStrike XDR, so joint customers can find attacker behaviors across public cloud, SaaS, identity, and networks from a single interface.

Read More
Undermining Microsoft Teams Security by Mining Tokens
September 13, 2022
|
By
Connor Peoples

Undermining Microsoft Teams Security by Mining Tokens

In August 2022, the Vectra Protect team identified an attack path that enables malicious actors with file system access to steal credentials for any Microsoft Teams user who is signed in. Attackers do not require elevated permissions to read these files, which exposes this concern to any attack that provides malicious actors with local or remote system access.

Read More
If a Threat detection catches an attacker and no one is around to see it, is it really detected?
August 18, 2022
|
By
Gearóid Ó Fearghaíl

If a Threat detection catches an attacker and no one is around to see it, is it really detected?

What value is there in detecting malicious actors if the detection isn’t noticed? Vectra makes sure that your security operations see everything, and our updated Splunk Integration is the latest offering to help you do this.

Read More
Needed: 700,000 Innovators. Wanted: a Safer and Fairer World
August 17, 2022
|
By
Hitesh Sheth

Needed: 700,000 Innovators. Wanted: a Safer and Fairer World

A major apprenticeship program from the US government could fill vacant cybersecurity jobs – and we’re here for it.

Read More
Take it from Gartner: The Time for the Right NDR Is Now!
August 16, 2022
|
By
Willem Hendrickx

Take it from Gartner: The Time for the Right NDR Is Now!

An influential industry analyst now declares NDR has reached the Hype Cycle’s “Slope of Enlightenment.” Vectra had confidence all along …

Read More
Abusing the Replicator: Silently Exfiltrating Data with the AWS S3 Replication Service
July 20, 2022
|
By
Kat Traxler

Abusing the Replicator: Silently Exfiltrating Data with the AWS S3 Replication Service

A comprehensive backup strategy is a cornerstone of any DR plan. But how would you distinguish between legitimate backup activity and malicious data exfiltration?

Read More
Erase the Unknowns, Transform the SOC
July 10, 2022
|
By
Mark Wojtasiak

Erase the Unknowns, Transform the SOC

We at Vectra think that SOC teams need to focus on 3 challenges to stay ahead of cyberattacks. ✔️ Coverage ✔️ Clarity ✔️ Control

Read More
As Customers Grasp the NIST Framework, They See More Value in Vectra
July 6, 2022
|
By
Willem Hendrickx

As Customers Grasp the NIST Framework, They See More Value in Vectra

A US government agency provides a powerful framework for understanding today’s cybersecurity challenges. Here’s where Vectra AI fits in.

Read More
 Why triage alerts when AI can do it for you?
July 1, 2022
|
By
Brad Woodberg

Why triage alerts - when AI can do it for you?

If you ask security analysts to describe the biggest pain points in their role, you will no doubt get a diverse set of answers.  One thing that they will almost certainly have in common is the challenge of dealing with alert fatigue.

Read More
Controlling Cyberattacks with PowerShell Shouldn't Mean Moving on Without it
June 24, 2022
|
By
John Mancini

Controlling Cyberattacks with PowerShell Shouldn't Mean Moving on Without it

Cybersecurity authorities from the United States, New Zealand, and the United Kingdom have released a joint Cybersecurity Information Sheet (CIS) that recommends proper configuration and monitoring of PowerShell to address the recurrence of the scripting language's use in cyberattacks.

Read More
The Truth About AI in Cybersecurity? To Reveal Real Value, Ask Four Questions
June 21, 2022
|
By
Willem Hendrickx

The Truth About AI in Cybersecurity? To Reveal Real Value, Ask Four Questions

Many security propositions claim artificial intelligence provides a value boost. The real story is more complicated.

Read More
The 9 C’s of Cybersecurity Value
June 13, 2022
|
By
Mark Wojtasiak

The 9 C’s of Cybersecurity Value

How to move cybersecurity forward? At the core of this discussion, we always find the same core values. We at Vectra live up to the 9 C’s.

Read More
Everyone Is Now Remote, NDR is No Longer Relevant
May 25, 2022
|
By
John O Callaghan

Everyone Is Now Remote, NDR is No Longer Relevant

Hybrid working models are a hacker's dream! Every remote IP is a potential risk. Learn how to protect your organization in the modern world. | Read now!

Read More
Hype Doesn’t Last. Great Cybersecurity Does
May 9, 2022
|
By
Willem Hendrickx

Hype Doesn’t Last. Great Cybersecurity Does

Most marketing messages are a cocktail of sober reality and hyperbole. Of course, the proportions may vary from season to season, from one company to the next, but hype continues to be a perpetual factor in the cybersecurity world. At Vectra, however, we are firm believers in sober reality.

Read More
Should security teams be giving service with a smile? 
April 27, 2022
|
By
The Masked CISO

Should security teams be giving service with a smile? 

Our Vectra Masked CISO series tackles some of the biggest issues in security and how to overcome them.

Read More
MITRE ATT&CK Coverage: Vectra AI provides over 90%
April 27, 2022
|
By
John Mancini

MITRE ATT&CK Coverage: Vectra AI provides over 90%

The MITRE ATT&ACK framework helps to keep your business secure. Learn how Vectra leverages MITRE ATT&CK and supports MITRE D3FEND.

Read More
New Data Suggests It’s Time to Change the Way Organizations Deal with Cyberattacks
April 26, 2022
|
By
Tim Wade

New Data Suggest It’s Time to Change the Way Organizations Deal with Cyberattacks

Vectra’s latest report on cybersecurity shows: Traditional approaches won’t work anymore. Key findings are listed here.

Read More
Chances are Users are Bypassing Your MFA
April 19, 2022
|
By
John Mancini

Azure AD: Users Are Bypassing Your MFA

In order to help security teams validate the effectiveness of their Azure AD security controls and stop future attacks, the Vectra platform continuously monitors user activity and reveals instances of users bypassing multi-factor authentication (MFA) and other preventative controls.

Read More
È ora di cambiare mentalità in materia di sicurezza
April 14, 2022
|
By
Massimiliano Galvagna

È ora di cambiare mentalità in materia di sicurezza

L’intensificarsi di attacchi informatici negli ultimi anni ha influenzato in modo significativo l’attenzione rivolta dalle aziende sulla vigilanza. C’è ancora tempo, però, per fare della protezione la vera priorità. 

Read More
Mounting Pressure in Cybersecurity Shouldn’t Discourage Those Who Wear Capes
April 7, 2022
|
By
Steve Cottrell

Mounting Pressure in Cybersecurity Shouldn’t Discourage Those Who Wear Capes

Regardless of discipline, cybersecurity professionals deal with mounting pressure each day to make the right decisions and strategically play the right hand to keep their organisations a step or two ahead of cybercriminals. It can be stressful. And with good reason as the attack surface is wider and more diverse than ever driven by heavy cloud usage, while those who work to exploit it continue to develop new tactics and tools to help expose security weaknesses.  

Read More
Una sfida alla sicurezza informatica: individuare i movimenti laterali degli aggressori 
April 6, 2022
|
By
Massimiliano Galvagna

Una sfida alla sicurezza informatica: individuare i movimenti laterali degli aggressori 

Con la pandemia e la diffusione del lavoro da remoto, gli attacchi informatici sono aumentati nel 2021, confermando una tendenza strutturale. Per difendersi, individuare i movimenti laterali è diventata una questione prioritaria per le aziende. 

Read More
Testing, Testing, Testing: Why Red Teaming is a Must for Every CISO
April 5, 2022
|
By
The Masked CISO

Testing, Testing, Testing: Why Red Teaming is a Must for Every CISO

The Vectra Masked CISO series gives security leaders a forum for discussing the biggest issues in security and advising their peers on how to overcome them.

Read More
Generals Without Uniforms: A Transformational Hour for CIOs and CISOs
March 25, 2022
|
By
Willem Hendrickx

Generals Without Uniforms: A Transformational Hour for CIOs and CISOs

We have never seen a full-on cyber conflict rage across the world’s digital systems, but if the situation in Ukraine leads to such a thing, CIOs and CISOs will find themselves on the front lines. With escalation patterns uncertain and no “rules of the road” governing cyberwar, any organization risks becoming a casualty. Already, CIOs and CISOs are seeing their roles evolve and enlarge. Vectra AI CRO Willem Hendrickx discusses their transformational hour

Read More
What If there was a Supply Chain Compromise of an IDP like Okta?
March 25, 2022
|
By
Luke Richards

What If there was a Supply Chain Compromise of an IDP like Okta?

What If there was a Supply Chain Compromise of an IDP?  The recent security incident at Okta represents yet another perspective on supply chain compromises. While this attack appears to not have been fully realized, resulting in an apparently limited number of businesses affected, it poses an interesting set of questions to think about in terms of what a supply chain attack against an IDP would look like when fully realized. The result of any IDP compromise, or that of any similar pervasive use technology could be an attack group with access to millions of users and thousands of businesses.  This blog provides perspective on the current situation and mitigation and defense strategies to manage such an event.

Read More
How Attackers Target Your AWS Cloud
March 24, 2022
|
By
Aakash Gupta

How Attackers Target Your AWS Cloud

The cloud is complex. AWS alone has over 200 services (and quickly growing). Securely configuring even a small set of these services to operate at the scale of modern organizations today creates a variety of challenges.

Read More
Movimiento lateral: cuando los ciberataques no vienen de frente
March 17, 2022
|
By
Ricardo Hernandez

Movimiento lateral: cuando los ciberataques no vienen de frente

El movimiento lateral ofrece a los atacantes puntos de control adicionales en una red comprometida

Read More
Le best practice di Vectra AI per tutelare le infrastrutture critiche
March 16, 2022
|
By
Massimiliano Galvagna

Le best practice di Vectra AI per tutelare le infrastrutture critiche

Gli attacchi informatici in Italia stanno crescendo a un ritmo elevato, sia in termini di complessità sia in termini di incidenza. Ciò è dovuto in parte alla crescente digitalizzazione, ma la maggiore esposizione alle minacce è frutto anche dei profondi cambiamenti portati dalla pandemia.

Read More
Insider Threats From External Events
March 15, 2022
|
By
Jonathan Barrett

Insider Threats From External Events

It’s only human to focus on external threats to your well-being. This often applies to organizations and their approaches to security as well; which is why so much energy is typically put into perimeter security. Yet, this approach is antithetical to the zero-trust methodology: Organizations must also pay attention to internal-to-internal and internal-to-external traffic just as much as traffic coming in. 

Read More
What Drives Vectra – and Me
March 14, 2022
|
By
Willem Hendrickx

What Drives Vectra – and Me

I want Vectra to be known also for its values, for its vision, for its people and attitude, and for its passion for making the world a safer and fairer place. In short, for our culture.

Read More
AI: Two Small Letters – Many Big Advantages
March 10, 2022
|
By
Yann Fareau

AI: Two Small Letters – Many Big Advantages

“Artificial intelligence is no match for human stupidity,” observed a wry Albert Einstein. Today, we have evolved to where AI can deliver critical and indispensable advantages in the race toward cybersecurity. Nevertheless, even brilliant security managers do not always see how or why this is the case.

Read More
SOC 2.0, la nuova frontiera della sicurezza secondo Vectra
March 9, 2022
|
By
Massimiliano Galvagna

SOC 2.0, la nuova frontiera della sicurezza secondo Vectra

Nell’era della trasformazione digitale, i servizi automatizzati si sono assicurati un posto di primo piano nell’agenda della maggior parte delle organizzazioni. Eppure, fino a poco tempo fa la sicurezza informatica è rimasta secondaria.

Read More
Russian Cyber Attacks: What We Know so far
March 9, 2022
|
By
Luke Richards

Russian Cyber Attacks: What We Know so far

Updated perspective on cyberthreats as a result of ongoing Ukrainian/Russian conflict, including specific custom recall queries, and aggregation of common Russian state actor TTPs.

Read More
Know Your Enemies – (Network) Behavior Gives Away the Attacker. Every Time.
March 8, 2022
|
By
Teppo Halonen

Know Your Enemies – (Network) Behavior Gives Away the Attacker. Every Time.

As the new reality of the continual dangers of cyberwar gradually sets in, organizations globally are working to harden their defenses. Most cyber-attacks are blocked by preventative safeguards. Highly motivated attackers, however, tend to find ways to get through those defenses.

Read More
Demystifying Advanced Microsoft Cloud Attacks
March 1, 2022
|
By
Aaron Turner

Demystifying Advanced Microsoft Cloud Attacks

Advanced Microsoft Cloud Attacks often attack through three key areas which we enumerate in this blog:  Service Principals, Multi-Factor Authentication (MFA) Downgrade, and Mobile-Device MFA Authenticators.

Read More
Digitalización y ciberseguridad
February 28, 2022
|
By
Ricardo Hernandez

Digitalización y ciberseguridad

La digitalización de las estructuras industriales, comerciales y sociales aumenta las apuestas de nuestro futuro, tanto en lo que respecta a las oportunidades, la equidad y los logros, así como a la disrupción y el caos a escalas antes inalcanzables.

Read More
Russian Wiper Malware is Novel – Protecting Against it Need Not Be
February 25, 2022
|
By
Oliver Tavakoli

Russian Wiper Malware is Novel – Protecting Against it Need Not Be

While this wiper malware is new, it reuses much of the playbook employed by Russian state actors and ransomware gangs - fighting back requires us to sharpen the tools we already have.

Read More
Cybersecurity 2022, Vectra AI individua le quattro aree che evolveranno
February 23, 2022
|
By
Massimiliano Galvagna

Cybersecurity 2022, Vectra AI individua le quattro aree che evolveranno

In che modo, le lezioni apprese dal 2021 ridisegneranno il panorama della sicurezza? Nel 2022 saranno quattro le aree della cybersecurity che evolveranno.

Read More
Customer Advisory Bulletin:  Mitigating, Detecting, and Responding to Russian Cyberactivity
February 23, 2022
|
By
Luke Richards

Mitigating, Detecting, and Responding to Russian Cyberactivity

Vectra customers should be aware that current global events related to Russian recognition of separatist regions of the Ukraine carry with them the risk of increased cyber activity conducted by Russian state level actors.  This includes evidence that the FSB, the main Intelligence Organization in Russia, is responsible for the DDoS against Ukrainian systems in February 2022. [1] Credible concern exists that target selection may expand past regional targets to include, for example, politically or economically useful targets in NATO countries.

Read More
Ransomware e RansomOps: la miglior difesa è il rilevamento tempestivo
February 21, 2022
|
By
Massimiliano Galvagna

Ransomware e RansomOps: la miglior difesa è il rilevamento tempestivo

I ransomware sono estremamente remunerativi per i cybercriminali e difficilmente spariranno dal panorama delle minacce informatiche nel breve periodo. Il rilevamento veloce e accurato – che al momento è possibile solo con approcci di detection and response basati sull’AI – è l’alleato migliore su cui gli stakeholder aziendali possono contare in questa battaglia.

Read More
Is a focus on tech skills for CISOs holding us back in the boardroom?
February 17, 2022
|
By
The Masked CISO

Is a focus on tech skills for CISOs holding us back in the boardroom?

The role of the CISO has never been clearly defined, and every CISO works differently.They are under a lot of pressure, and this leads to regular rotation of roles. The Masked CISO explains how this could be stopped if CISOs were given more autonomy and responsibility.

Read More
High Growth with a Human Face
February 14, 2022
|
By
Willem Hendrickx

High Growth with a Human Face

New Vectra CRO wants to achieve aggressive growth and continued global expansion for Vectra's leading network detection and response platform.

Read More
El cambio de paradigma de la ciberseguridad es clave para la transformación digital
February 9, 2022
|
By
Ricardo Hernandez

El cambio de paradigma de la ciberseguridad es clave para la transformación digital

Las empresas han acelerado la adopción y transformación de la nube, principalmente debido a la pandemia del covid-19 que ha incrementado el teletrabajo y transformado la red. Dicha transformación ha creado nuevos retos y entornos que hay que proteger. La necesidad de desarrollar un nuevo paradigma de ciberseguridad que proteja el acceso a la red es uno de los desafíos a los que se están enfrentando las empresas. 

Read More
Not All AI is Created Equal
February 1, 2022
|
By
Kevin Kennedy

Not All AI is Created Equal

In this blog series, Kevin Kennedy, SVP of Products at Vectra goes beyond the buzzwords and explains what artificial intelligence and machine learning truly mean in relation to cybersecurity. He explains how organizations using AI can gain an advantage over today’s attackers that will stop them in their tracks.

Read More
The Great AI/ML Debate
January 31, 2022
|
By
Kevin Kennedy

The Great AI/ML Debate

In this blog series, Kevin Kennedy, SVP of Products at Vectra goes beyond the buzzwords and explains what artificial intelligence and machine learning truly mean in relation to cybersecurity. He explains how organizations using AI can gain an advantage over today’s attackers that will stop them in their tracks.

Read More
Log4J: una vulnerabilidad que puede ser combatida
January 31, 2022
|
By
Antonio Huertas

Log4J: una vulnerabilidad que puede ser combatida

Estos últimos semanas, la vulnerabilidad Log4J está siendo de actualidad. 

Existe el temor real de que muchas organizaciones sean víctimas de ciberataques en los próximos días, semanas e incluso meses. Sin embargo, existen soluciones técnicas para evitar este escenario catastrófico.

Read More
Ransomware protection: How to identify attacks with NDR & AI
January 26, 2022
|
By
Steve Cottrell

Ransomware protection: How to identify attacks with NDR & AI

Software attacks with an extortionist background are unfortunately becoming the norm for many companies. But what if automated anti ransomware tools could unmask malware at an early stage and combat them effectively - even before they can cause harm?


Read More
Log4J Won’t Be the Last Exploit, So Let’s Make Sure You’re Ready
January 25, 2022
|
By
Vectra

Log4J Won’t Be the Last Exploit, So Let’s Make Sure You’re Ready

As we saw with the Log4J vulnerability, cybercriminals only need a single opening to infiltrate your environment. And while another vulnerability can’t be prevented, there’s still a lot that can be done to make sure you’re ready for the next one.

Read More
Being “Threat-Led” is the answer. Your ISO certificate won’t save you from a breach!
January 20, 2022
|
By
The Masked CISO

Being “Threat-Led” is the answer. Your ISO certificate won’t save you from a breach!

A threat-led approach is key to an organisation’s security strategy. CISOs should measure security based on their ability to discover if they’ve been breached, mean time to breach when testing security, or the mean time to detect unknown threats.

Read More
Assume Compromise: It's time to change your security mentality
January 20, 2022
|
By
Tim Wade

Assume Compromise: It's time to change your security mentality

With ransomware attacks continuing to dominate media headlines, it’s clear that a security approach centered on prevention no longer suffices. A shift towards an ‘assume compromise’ security approach prepares your business to deal with the intensity and frequency of today’s ransomware attacks. To that end, advanced detection and response capabilities play a crucial role. In this blog, you will also learn why a large British multinational insurance company chose Vectra, Wipro’s Venture Partner, to meet its security needs.

Read More
Cybersecurity 2022: These four areas will evolve!
January 18, 2022
|
By
Willem Hendrickx

Cybersecurity 2022: These four areas will evolve!

Every year the world of cybersecurity encounters new challenges and obstacles for organisations to overcome, but 2021 managed to be an exceptionally dangerous year. So how will the lessons learnt from 2021 shape the cybersecurity landscape? Here are four areas of cybersecurity that will evolve in 2022.

Read More
Security principles vs zero day attack, who wins?
January 12, 2022
|
By
Steve Cottrell

Security principles vs zero day attack, who wins?

When it comes to cyber security, the old adage of ‘doing the simple things well’ is more relevant today than ever before. Three simple principles have been around for decades but they hold true now more than ever because we live in an increasingly cloud-orientated environment where we need to be vigilant at all times.

Read More
Log4J’s Unique Impact In The Cloud
December 20, 2021
|
By
Kat Traxler

Log4J’s Unique Impact In The Cloud

Threat actors can use the Log4J vulnerability as a platform for launching attacks, but what does this mean for cloud environments? Find out exactly how attackers are exploiting this vulnerability and what this could mean for your organization.

Read More
Move fast, break security: why CISOs must push back against Agile IT
December 16, 2021
|
By
The Masked CISO

Move fast, break security: why CISOs must push back against Agile IT

Agile has its uses. It’s increasingly being adopted as a technology wide operating model—to drive transformation everywhere, from helpdesks to datacenters. But is it always appropriate?

Read More
Log4Shell - The Evolution of an Exploit
December 15, 2021
|
By
Luke Richards

Log4Shell - The Evolution of an Exploit

A few days after the Log4Shell vulnerability was discovered, we now have more observations about how the exploit is being leveraged. Here’s what we know, today.

Read More
CVE-2021-44228 Log4J Zero Day Affecting… The Internet
December 10, 2021
|
By
Luke Richards

CVE-2021-44228 Log4J Zero Day Affecting… The Internet

A new 0day was discovered in the log4j application on December 10, 2021. This vulnerability impacts a widely used logging solution spanning an incredibly large attack surface.

Read More
Nine Questions To Ask Your AI Vendor And Why
December 5, 2021
|
By
Vectra

Nine Questions To Ask Your AI Vendor And Why

Asking the right questions to your vendor is critical to dissociate the trendy marketing wording from reality. Asking questions such as "What type of machine learning algorithms does your product use?" will help. Discover the top nine questions we think you should ask.

Read More
UK Survey research blog
December 2, 2021
|
By
Garry Veale

New Research Uncovers How Top Security Teams Detect Cyberthreats

Exclusive cybersecurity research presented in a new report, details how hundreds of security leaders are addressing today’s complex cyberthreats in their organisations.

Read More
Survival of the Fittest - Masked CISO IDPS
November 29, 2021
|
By
The Masked CISO

It’s about the survival of the fittest!

CISOs Must be Brave Enough to Throw Away Their Security Playbook or Suffer the Consequences!

Read More
Fast Growth Requires Even Faster Security
November 17, 2021
|
By
Jesse Kimbrel

Fast Growth Requires Even Faster Security

Vectra has been recognized as a DeloitteTechnology Fast 500™ award winner — a ranking of the fastest-growing technology, media, telecommunications, life sciences, fintech, and energy tech companies in North America.

Read More
Introducing Sidekick MDR: 24*7 eyes-on-glass service for threat detection and response
November 9, 2021
|
By
Jonathan Barrett

Introducing Sidekick MDR: 24*7 eyes-on-glass service for threat detection and response

Introducing Sidekick MDR for VECTRA customers with 24*7 eyes-on-glass service leveraging cloud-scale analytics of the VECTRA Cognito platform to enable security teams to meaningfully detect and respond to ransomware, nation-state and insider attacks.

Read More
Vectra vs. Darktrace: Why Customers Choose Us by a Wide Margin
October 27, 2021
|
By
Kevin Kennedy

Vectra vs. Darktrace: Why Customers Choose Us by a Wide Margin

Learn why these two points are critical when choosing a threat detection and response vendor: 1) Darktrace is a sales & marketing engine, not a technology innovator 2) 91% of customers who consider both Darktrace and Vectra choose Vectra.

Read More
How Tallink Tosses Cybercriminals Overboard
October 19, 2021
|
By
Sridevi Sheth

How Tallink Tosses Cybercriminals Overboard

Hear what Tallink, the largest shipping company operating in the Baltic Sea, says are the most valuable capabilities in an NDR solution and what you need to know when selecting one for your environment.

Read More
Doing Your Part to Secure Your Microsoft Cloud
October 18, 2021
|
By
Jesse Kimbrel

Doing Your Part to Secure Your Microsoft Cloud

“Do your part” is the theme of this year’s Cybersecurity Awareness Month. See what you can do right now so cyberattacks don’t become a problem in your Microsoft cloud environment.

Read More
The Importance of Workflow Integration for Effective Incident Response
October 6, 2021
|
By
Thomas Mulligan

The Importance of Workflow Integration for Effective Incident Response

Many organizations these days face incident response challenges. Get insight about the common challenges in this area, and what your organization can do to resolve them.

Read More
4 Ways to Give Your SOC Valuable Time Back with AI
September 29, 2021
|
By
Jesse Kimbrel

4 Ways to Give Your SOC Valuable Time Back with AI

AI can save your SOC valuable time by automating workloads, while accurately tracking down cyberattacker activities found in ransomware and supply chain attacks.

Read More
Ransomware & RansomOps Contained: How to Best the Digital Pest
September 23, 2021
|
By
Rabih Itani

Ransomware & RansomOps Contained: How to Best the Digital Pest

Ransomware. It is the new digital bogeyman. In the UAE, an industry survey from June 2021showed the extent to which the country (and by implication, the wider region)has been subjected to ransomware. Some 37% of respondents said they had beenvictims in the previous two years. A staggering 84% elected to pay the ransom, only for most of them — 90% of those who paid — to suffer from second attacksthat often came from the same bad actors.

Read More
Is Ransomware Damage Irreversible?
September 10, 2021
|
By
Nagi SriRanga

Is Ransomware Damage Irreversible?

Vectra Detect cybersecurity solution is purpose-built to detect and stop ransomware attacks. The agentless and AI-driven Cognito Platform sees and stops ransomware before it can encrypt files and exfiltrate data by automatically detecting attacker behavior.

Read More
Detecting When Ransomware Moves into Your Cloud
August 25, 2021
|
By
Jesse Kimbrel

Detecting When Ransomware Moves into Your Cloud

Stopping ransomware requires a new way of thinking. See why you can’t only rely on legacy tools to keep your organization safe, but rather how you can leverage AI to detect when this invasive threat enters your cloud.

Read More
5 Areas Exposing Your AWS Deployments to Security Threats
August 18, 2021
|
By
Vectra

5 Areas Exposing Your AWS Deployments to Security Threats

Organizations continue to deploy rapidly in the cloud, while security is often an afterthought. Read about the five areas that could be exposing your AWS deployments to security threats. 

Read More
How Security Experts are Surviving Cloud Transformation
August 17, 2021
|
By
Tim Wade

How Security Experts are Surviving Cloud Transformation

Hear cloud security experts from Splunk and Vectra explain how digital transformation has drastically changed security and why organizations need to adapt.

Read More
Hacker Raises Hand, Claims T-Mobile Breach
August 16, 2021
|
By
Vectra

Hacker Raises Hand, Claims T-Mobile Breach

T-Mobile investigates a hacker who claims to breach data of 100 million customers. See what possible outcomes this could result in for the telecoms company.

Read More
Uncovering Security Blind Spots in IaaS and PaaS Environments
August 11, 2021
|
By
Vectra

Uncovering Security Blind Spots in IaaS and PaaS Environments

As organizations continue to build on AWS with no sign of slowing down, it’s important to know where the security blind spots are and how to address them.

Read More
State of Security: How Pros Address Daily Cloud Security Challenges
August 4, 2021
|
By
Vectra

State of Security: How Pros Address Daily Cloud Security Challenges

The State of Security Report: PaaS and IaaS takes a close look at how organizations are addressing security in AWS and the challenges they face.

Read More
Microsoft Partners with Vectra to Deliver Zero Trust Security 
July 21, 2021
|
By
Vectra

Microsoft Partners with Vectra to Deliver Zero Trust Security 

Microsoft partners with Vectra to deliver Zero Trust security framework to provide analytics and mitigate threats emerging from distributed and hybrid-remote workforces.

Read More
Confronting Risk and Exposure in Healthcare
July 15, 2021
|
By
Vectra

Confronting Risk and Exposure in Healthcare

Attackers intent on stealing personally identifiable information (PII) and protected health information (PHI) can easily exploit gaps in IT security policies and procedures to disrupt critical healthcare-delivery processes.

Read More
MITRE D3FEND: Learn MITRE D3FEND Framework & Techniques
July 13, 2021
|
By
Rohan Chitradurga

MITRE D3FEND: Learn MITRE D3FEND Framework & Techniques

After obsessing for years over pushing the limits with AI to detect cyberattacker behavior, Vectra is proud to hold the most patents referenced in MITRE D3FEND.

Read More
Prevention and Preparedness Revisited: Cyber Defense After Kaseya Ransomware Attack
July 5, 2021
|
By
Hitesh Sheth

Prevention and Preparedness Revisited: Cyber Defense after Kaseya Ransomware Attack

There should be fresh scrutiny of SaaS subscription relationships, and the security policies of managed service providers; you’re only as secure as your provider.

Read More
New Think Tank Report Shapes EU Thinking on AI and Cybersecurity
July 4, 2021
|
By
Willem Hendrickx

New Think Tank Report Shapes EU Thinking on AI and Cybersecurity

Vectra is key contributor to new CEPS Report on the Technology, Governance and Policy Challenges of AI and Cybersecurity and supports Vectra’s mission to make the world a safer and fairer place.

Read More
Putting CVE-2021-1675 PrintNightmare to Rest
July 2, 2021
|
By
Luke Richards

Putting CVE-2021-1675 PrintNightmare to Rest

A new remote code execution vulnerability in Windows Print Spooler, now known as CVE-2021-1675, or PrintNightmare can be exploited by attackers to take control of affected systems. Find out how to detect and stop this exploit with Vectra.

Read More
Taking Down Cloud Threats for the Win
June 29, 2021
|
By
Vectra

Taking Down Cloud Threats for the Win

Vectra is honored to be named Cloud Security/SaaS Disruptor Company of the Year with a Gold Globee® Award in the Annual 2021 Awards.

Read More
Demystifying Cloud Security with Forrester
June 29, 2021
|
By
Vectra

Demystifying Cloud Security with Forrester

The rapid shift to cloud-everything left users and apps vulnerable to security threats across all environments. Andras Cser from Forrester joined Joe Malenfant and Gokul Rajagopalan from Vectra to discuss cloud trends among organizations.

Read More
Are You Transforming Your SOC Yet?
June 24, 2021
|
By
Henrik Davidsson

Are You Transforming Your SOC Yet?

As SOC 1.0 remains the norm for many organizations, this way of doing things does have its challenges. See why more organizations are updating their approach in an effort to spot attacks faster while benefiting from a cost savings.

Read More
5 Things to Know About DarkSide Ransomware
June 22, 2021
|
By
Vectra

5 Things to Know about DarkSide & Other Ransomware as a Service Groups

DarkSide ransomware as a service (RaaS) group provided hackers with a convenient way to extort money from organizations after access was gained. Here are five things you need to know about this prominent cybercriminal group.

Read More
Vectra Introduces Detect for AWS: Threat Detection and Response for IaaS and PaaS
June 16, 2021
|
By
Vectra

Vectra Introduces Detect for AWS: Threat Detection and Response for IaaS and PaaS

Vectra introduces Detect for AWS, solving threat detection and response for Platform as a Service (PaaS) and Infrastructure as a Service (IaaS) environments.

Read More
Detecting Attackers as They Head Towards Your Money
June 14, 2021
|
By
Tim Wade

Detecting Attackers as They Head Towards Your Money

What makes threat detection so challenging? We answer that question and provide the expert insight around our latest Spotlight Report—Vision and Visibility: Top 10 Threat Detections for Microsoft Azure AD and Office 365.

Read More
Is the Cloud Control Plane a New Frontline in Cybersecurity?
June 2, 2021
|
By
Tim Wade

Is the Cloud Control Plane a New Frontline in Cybersecurity?

As cloud adoption continues to accelerate, the evolution of the next generation of modern attacks will traverse through and towards an enterprise’s cloud control plane. Learn why this risk should not be underestimated.

Read More
The Supply Chain’s Broken Link - Identifying and Preventing Supply Chain Attacks
May 26, 2021
|
By
Matthew Pieklik

The Supply Chain’s Broken Link—Identifying and Preventing Supply Chain Attacks

Supply chain attacks represent an appealing opportunity for attackers. See why this type of attack is gaining in popularity and what defenders need to know to keep their organization safe.

Read More
Detecting the “Out of the Ordinary” in Your Microsoft Cloud Environment
May 19, 2021
|
By
Matthew Pieklik

Detecting the “Out of the Ordinary” in Your Microsoft Cloud Environment

In our latest Spotlight Report, see how the Top 10 Threat Detections seen across Microsoft Azure AD and Office 365 allow security teams to detect infrequent behavior that is abnormal or unsafe across their environments.

Read More
Achieve Zero Trust Access Visibility with Zscaler and Vectra
May 18, 2021
|
By
Sam Martin

Achieve Zero Trust Access Visibility with Zscaler and Vectra

We’re excited to announce a new integration with Zscaler! Find out how this integration with Cognito Detect provides end-to-end access visibility and protection for remote workers and business-critical applications.

Read More
Here We Go Again....One Week After the Colonial Pipeline Attack, More Ransomware
May 17, 2021
|
By
Tim Wade

Here We Go Again....One Week After the Colonial Pipeline Attack, More Ransomware

Just a week after the Colonial Pipeline was shut down due to ransomware—attackers are at it again. It’s now being reported that Ireland’s health service shut down its IT systems and a company in Germany had to fork out a $4.4 million ransom on the same day.

Read More