February 22, 2021
Security leaders need to measure success, but too often the exercise focuses more on the absence of failure than the presence of success. Here’s three practical guideposts to achieve meaningful organizational security.
February 22, 2021
Security leaders need to measure success, but too often the exercise focuses more on the absence of failure than the presence of success. Here’s three practical guideposts to achieve meaningful organizational security.
February 17, 2021
Vectra researchers have dissected the SolarWinds supply chain compromise from the initial backdoor to the establishment of persistent access in the data center and cloud environments. A specific focus is provided for Microsoft Office 365, which appears to have been a key target.
February 11, 2021
Vectra announces extended support for Azure AD in Cognito Detect for Office 365. Find out how this increased coverage can secure users’ cloud identities and reduce consequences of supply chain attacks.
February 8, 2021
CRN® has named Jessica Couto, VP of Channel, Americas, at Vectra AI, to its 2021 list of Channel Chiefs. The prestigious CRN® Channel Chiefs list, released annually, recognizes prominent leaders that demonstrates exceptional leadership, vision, and commitment to their channel partner programs.
by topic
by author
by language
by date
Security leaders need to measure success, but too often the exercise focuses more on the absence of failure than the presence of success. Here’s three practical guideposts to achieve meaningful organizational security.
Vectra researchers have dissected the SolarWinds supply chain compromise from the initial backdoor to the establishment of persistent access in the data center and cloud environments. A specific focus is provided for Microsoft Office 365, which appears to have been a key target.
Vectra announces extended support for Azure AD in Cognito Detect for Office 365. Find out how this increased coverage can secure users’ cloud identities and reduce consequences of supply chain attacks.
Pendant la pandémie, les pirates ont profité des informations sur le COVID-19. Découvrez comment un message LinkedIn ordinaire a déclenché une réaction en chaîne qui a conduit à une attaque généralisée et astucieuse contre l'une des principales sociétés pharmaceutiques.
Während der Pandemie haben Hacker Informationen über COVID-19 genützt. Finden Sie heraus, wie eine gewöhnliche LinkedIn-Nachricht eine Kettenreaktion auslöste, die zu einem weit verbreiteten, raffinierten Angriff auf eines der weltweit führenden Pharmaunternehmen führte.
CRN® has named Jessica Couto, VP of Channel, Americas, at Vectra AI, to its 2021 list of Channel Chiefs. The prestigious CRN® Channel Chiefs list, released annually, recognizes prominent leaders that demonstrates exceptional leadership, vision, and commitment to their channel partner programs.
As witnessed by the SolarWinds attack, compromising a single Azure AD account gives an attacker access to multiple SaaS apps, including Microsoft Office 365. This single point has made it critical for organizations to be able to detect and respond to attacks from Azure AD.
The pandemic has made threat actors eager to exploit information about COVID-19. Find out how an ordinary LinkedIn message set off a chain reaction that escalated into a widespread, sophisticated attack at one of the world's leading pharmaceutical companies.
Learn how Command and Control (C2) frameworks are continuing to evolve in order to evade detection. Here we will examine a method known as JA3 signature randomization.
In 2020 we got a glimpse of just how much AI is beginning to penetrate everyday life. However, practical applications raise important questions about the ethical use of AI. In this blog, we reflect on the biggest stories in AI from last year.
Learn from Vectra CRO, Marc Gemassmer, what makes the SolarWinds hack unique from other breaches and how network detection and response can help remediate similar attacks in the future.
Learn why a successful implementation of a Zero Trust Architecture requires a modern network detection and response solution that can collect metadata about encrypted traffic – without relying on the overhead of agents.
Es ist wieder an der Zeit, uns die jüngere Vergangenheit anzuschauen und in die Zukunft zu blicken und darauf, was uns das nächste Jahr in puncto Cyber-Sicherheit bringen wird.
As our reliance on technology grows, so does the need for robust cybersecurity to protect users and keep data and business operations safe from hackers. Growth in cybercriminal activity has become a Catch 22 – the more organisations invest in data protection technologies, the more adept cyber criminals become.
The number of threats targeted towards Office 365 users and other similar platforms will undoubtedly continue to grow in 2021. Learn from our CTO, Oliver Tavakoli, what your company can do to prepare for the rise of targeted SaaS threats in 2021.
Discover step-by-step how Vectra identified early indicators of a ransomware attack and prevented the encryption of network file share in this blog.
With Adobe Flash officially marking its end-of-life on Jan. 1, 2021, assessing Flash usage is imperative to prevent attacks though that avenue. Cognito Recall from Vectra now has a Flash dashboard to help organizations decommission Flash across their networks.
Discover how the new security insights feature in the Vectra Cognito network detection and response platform eliminates the need for analysts to pivot between tools and provides additional insights related to attacker detections.
Discover what you need to know about the SolarWinds Orions compromise, how it unfolded and why monitoring users in the cloud is imperative to protect your enterprise.
Discover new learnings from the FireEye breach, including how the Vectra security research team understood the objectives of many of the stolen tools, how those tools would present on the network, and how behavior-based detection can identify their use in an attack.
Our Head of Security Analytics, Chris Morales, shares how to mitigate online shopping threats and keep your personal data safe this holiday season.
Most solutions today provide siloed views of an account, making it impossible to track attack progression across the cloud and network – except ours. In Cognito, we're excited to release a unified view of an account, one that tracks attacker behaviors across network and cloud.
With more than 200 million monthly subscribers, Office 365 is a rich target for cybercriminals. Learn why MFA no longer stops attackers in this new cybersecurity landscape but network detection and response can.
Vectra CTO Oliver Tavakoli looks back on a disruptive 2020 and shares his view of what 2021 holds for security practices.
Aujourd’hui encore, il faut une moyenne de 200 jours pour repérer une attaque informatique, la plupart des outils préventifs s’arrêtant après la primo infection. En effet, en matière de sécurité informatique, une fois qu’un élément est compromis et qu’un attaquant a réussi à pénétrer un élément du système, il est quasiment impossible de le détecter.
Learn why we are celebrating our placement in the Deloitte Fast 500 list as an achievement and testament to a customer-first approach rather than a numbers goal.
Learn how Vectra protects users and data beyond the traditional network by detecting malicious intent and tracking and stopping attackers who move between cloud, hybrid, and enterprise – ultimately reducing the risk of breach.
“Ransomware operators” are rational economic entities that have evolved their tactics to optimize their ill-gotten financial returns. Their behavior changes mean detection and response approaches must change too.
The goal of an efficient incident response process is to free-up security analyst's time to focus on higher value work that requires critical thinking. Learn how automation can be applied to a detection and response process.
Learn from Principle Research Analyst, Eric Hanselman, from 451 Research how the combination of the right data and the right analytics can help security teams to secure what is an important resource for the modern enterprise.
Vectra research highlights how attackers are using built-in tools and services to attack Office 365. We examine two such attacks that were detected and thwarted by organizations protected by Cognito Detect for Office 365.
National Institute for Standards and Technology (NIST) publication for the Zero Trust Architecture (NIST SP 800-207) relies heavily on continuous and accurate monitoring. Find out why network detection and response (NDR) is a required component.
If you are in security operations, have you ever wondered how long it will take before use cases and playbooks are ready or prove value to your organization?
Vectra Cognito announces the expansion of the partnership with Splunk as a launch partner for Splunk Mission Control, a cloud-based and future-ready unified security operations platform.
When you factor in how long it takes to discover a data breach, it suggests that healthcare is losing the battle. Discover a fundamental approach being advocated by a growing number of healthcare security professionals.
Attackers are using legitimate tools built into Microsoft Office 365 to perform reconnaissance, move laterally, and extend their attacks. OurSpotlight Report on Office 365 identifies what they’re up to and where you should be looking.
Learn more about how Vectra’s new Cognito Detect Lockdown feature, made possible by integrating with CrowdStrike Falcon Insight Endpoint Detection and Response (EDR), enables you to automatically thwart cyberattackers on the device level.
Discover how maturity and capability can be defined and measured across the five stages of the maturity model based on the desired level of risk awareness.
Read the Office 365 Spotlight Report to learn about the primary cybersecurity threats that can lead to Office 365 takeovers and breaches.
Die Kombination von EDR, NDR sowie SIEM bilden die SOC-Transparenz-Triade. Doch auf dem steinigen Weg zur Transparenz im Security Operations Center (SOC) muss man bei der Implementierung von Angriffserkennungstools zahlreiche Hindernisse überwinden.
We’re excited to announce a partnership with Fortinet to integrate the Cognito platform and FortiGate next-generation firewalls to detect, respond, and block cyberattacks in cloud, data center, IoT, and enterprise networks.
Asset management is one of the toughest challenges IT organizations can face. Discover why the ability to detect threats early on the network is better than ranking your critical systems.
A mature incident response process provides the benefit of faster response to reduce the amount of time an attacker has access to organization resources. Discover the metrics security teams can use to measure risk and mitigation.
Analyzing the psychology of an insider threat case is a complex task because there is little evidence and scant public data about threat incidents. Develop an improved understanding of the mind of malicious insiders with the multiple life-stage model.
Gregory Cardiet, technical leader for Vectra, shares his thoughts and experiences on why enterprises are increasingly integrating network detection and response (NDR) as a core element of their security operations visibility capabilities.
We’re delighted to to announce a new integration between our Cognito platform for NDR and the cPacket Networks visibility solution. The combined techniques provide robust security-response capabilities that track the source, target, and method of attack.
Evaluating risk factors is the first step in implementing an effective insider threat program. Learn why implementing preventative solutions like network detection and response can minimize financial loss and risk of a breach.
The recent ZeroLogon (CVE-2020-1472) vulnerability allows an attacker to gain Domain Admin credentials. The Vectra AI/ML models are designed to detect attacks regardless of tools or signatures and alerted on ZeroLogon even before it was announced.
During a merger and acquisition, there are several critical cybersecurity challenges to overcome and manage during an M&A. Vectra can help speed-up due diligence and integration by automating threat hunting and prioritizing detected threats based on certainty and risk
Learn why the SOC visibility triad is a better way to gain full visibility into threats and why Vectra is critical to help provide that visibility.
What danger do malicious and negligent insiders constitute and what kind of insider threats exist? Is your organization safe? Learn to spot the two types of insider threats.
With the advent of AI, managed security service providers (MSSPs) have a huge opportunity to improve 24x7 network threat detection, response and visibility while augmenting their understanding of security events.
The ultimate goal of most insider attacks is to steal data. Just one insider threat incident can cost your organization up to $3 million. Learn when disclosure is protected and how to stay ahead of malicious attacks in this blog.
The problem of detecting an insider threat before it happens is difficult to solve as the prediction of human behavior itself. Discover how applying a data science approach to detection can reveal clues to catch know and unknown attackers across your enterprise.
Discover in this blog why many organizations are struggling with the burden of maintaining IDPS deployments and how security teams can instead concentrate on detecting and mitigating active threats inside the network with network detection and response.
New dashboard in Cognito Recall shows certificates in your network that are actively in use, those that are about to expire and ones that have already expired. This will enable you to deliver tangible value to system administrators and service owners by alerting them if widely-used key certificates in your organization will expire soon and helping to prevent easily-avoidable outages.
Learn how IDPS is ill-equipped to detect what is known as lateral movement, east-west traffic, or simply attackers moving around inside your deployments due to reliance on signatures and being deployed at the network perimeter.
Consider getting rid of IDPS and the noise it creates and check out detecting and stopping cyberattacks using NDR. Free-up your security analysts to focus on investigations and threat-hunting instead of tweaking signatures.
AI-based detections are great at identifying attacker behaviors while threat intelligence provides fast, labeled coverage of known threats. Adding threat intelligence extends the coverage of AI-based detections to give security teams the most durable coverage and early understanding of threats.
Maze ransomware can spread across a corporate network, infecting computers it finds and encrypting data so it cannot be accessed. Learn what a Maze attack progression looks like and how you can defend against these types of threats.
Learn why using AI models to look for the communication pattern of a RAT in network data, can help detect them in real-time with high-fidelity based on the behavior observed.
En première ligne de la pandémie de COVID-19, les professionnels de la santé chargés de nous protéger travaillent sans relâche pour prendre soin de nous. Mais comment le secteur de la santé a-t-il fait face aux cyberattaques ciblées en cette période critique ?
We need more than just APIs. When security vendors truly collaborate and integrate their tools, we enable our customer’s security teams to further improve the agility, efficiency and efficacy of their security operations.
The newly announced Vectra services enable our customers to produce positive security outcomes, optimize security operations, and backup their teams when it matters most, with access to Vectra experts.
What the recent advanced threat actor 29 shows about the security limitations of indicator of compromise and how you can defend against privileged access attacks.
Battista Cagnoni examines how you can mature your Security Operations Center (SOC) using processes for reactive threat detection and proactive threat hunting.
Privileged access is a key part of lateral movement in cyberattacks because privileged accounts have the widest range of access to critical information, making them the most valuable assets for attackers. The recent Twitter Hack compromising several high-profile accounts becomes another stark example.
Our integration with Microsoft Defender ATP lets you perform Host Lockdown on Microsoft Defender ATP hosts.
At Vectra, our partners are integral to the way we go tomarket and we want to ensure you we are committed to the mutual success of our relationship.
Die Umstellung des Gesundheitswesens auf die Cloud ist nicht neu. COVID-19 hat jedoch die Roadmap für die Cloud-Einführung beschleunigt und die Sicherheitsteams somit in einen eher reaktiven als proaktiven Angreifersuchmodus versetzt.
Ze lopen altijd voorop tijdens de COVID-19-pandemie: gezondheidswerkers werken onvermoeibaar door voor ons. Maar hoe doet de zorg het in deze tijden van crisis als het gaat om gerichte cyberaanvallen?
Healthcare’s shift to the cloud is not new. However,COVID-19 has accelerated the roadmap for cloud adoption leaving healthcare security teams in a reactive mode rather than staying proactive to head-off the spread of potential attacks.
Learn why Microsoft Power Automate is great for Office 365 users, but why it’s terrifying for security professionals.
MFA is a great step to take, but there are always ways around preventive controls. One of the well-known MFA bypass techniques is the installation of malicious Azure/O365 OAuth apps. In case there were any doubts, the recent attacks on Government and business reported by the AustralianPrime Minister constitute a powerful reminder. Learn why you need to implement detection-based solutions.
The long-awaited Gartner Market Guide for Network Detection and Response (NDR) has been released and there are a few critically important things we believe you should note before diving into the document and the redefined category. As the market pushes to move away from simple analysis and towards actionable response, the “R” in NDR must be recognized for what it truly is – an opportunity for your organization to have a clearly outlined strategy for automatic and manual response.
Vectra announces a partnership and deep product integration with Microsoft Defender ATP (EDR) and Microsoft Azure Sentinel (SIEM) to further our extensive partner ecosystem and allow our customers to leverage the tools they already are using. This integration will ultimately elevate the visibility of the SOC and prevent attackers from establishing footholds across enterprise networks.
Vectra is pleased to announce the launch of two new training certification tracks for our partners. The VPSE certification is geared toward sales engineers, while our VSP certification focuses on positioning and selling Vectra Cognito.
Attack tools and techniques can change over time, but attack behaviours remain a stable indicator of attackers within the network. Using attack behaviour as a high-fidelity signal allows you to take action quickly to stop attacks or prevent further damage.
In order to contain the spread of COVID-19, employees are being asked to work remotely when possible. This sudden and immediate shift of employees who would normally work in an office to a remote location will naturally create a shift in internal movement of network traffic. The outcome will be a change of internal network traffic patterns in which attackers could hide their own communication.
The below areas will require extra attention and understanding by the security operations analysts who are handling the day to day impact of their quickly changing environment.
In the era of near-total data, SOC teams and analysts can become swamped by the sheer volume. And that’s before we even get to the cost of data ingestion and storage! In this blog, we will explore the value of network metadata, and why we just can’t get this level of visibility elsewhere.
This blog post is the first in a series that will cover basic threat investigation and threat hunting techniques using network metadata from Cognito Stream.
Together, Vectra and Sentinel One lead to fast and well-coordinated responses across all resources, enhance the efficiency of security operations and reduce the dwell times that ultimately drive risk for the business.
Together, Cognito and Cybereason provides visibility into all enterprise environments, supporting hybrid, multi-cloud, or on-premises deployments with ease to combat against today’s modern cyberattacks.
Modern SOCs today are looking for tools that can give them complete visibility into user endpoints, multi-cloud, hybrid, and on-prem networks, as well as correlation and forensic capabilities. In this search, the SOC visibility triad has emerged as the de-facto standard. The SOC visibility triad encourages three specialized technologies. EDR for endpoint, NDR for Network, and SIEM for security analytics and correlation. But for all of this tech to be successful, they need robust integrations to each other, as SOC analysts’ time is at a premium.
Account Lockdown from Vectra allows for immediate, customizable account enforcement via Active Directory integration. You can now surgically freeze account access and avoid service disruption by disabling accounts rather than your network. By disabling an attacker's account, you can limit attacker progression along the killchain. This gives your SOC analysts time to conduct a thorough investigation, knowing that they have contained the blast radius of an attack by limiting the use of account-based attack vectors.
With increasingly sophisticated threats, cyber risk is becoming an escalating concern for organizations around the world. Data breaches through Office 365 lead the pack as 40% of organizations suffer from account takeovers despite the rising adoption of incremental security approaches like multi-factor authentication.
Over the past decade, cyber operations have become intertwined with geopolitical conflict. In recent asymmetric campaigns, state-sponsored threat groups have mapped critical infrastructure, disrupted systems, held information hostage, and stolen state secrets as a form of warfare.
PAA enables SOC teams to monitor and defend against these types of attacks. In addition to our extensive models that detect command-and-control channels, this make the Cognito platform a powerful tool to combat evolving malware attacks against enterprises.
Thinking about threat hunting by using terms from the MITRE’s ATT&CK Matrix to frame the context and guide what you can and cannot see within your environment.
Vectra now integrates with Amazon Virtual Private Cloud (VPC) Ingress Routing and that our AI platform is currently available in the AWS Marketplace.
The Cognito threat detection and response platform from Vectra now seamlessly integrates AI-based threat hunting and incident response of Chronicle Backstory, a global security telemetry platform, for increased context during investigations and hunts and greater operational intelligence.
That’s why we are happy to announce the integration of Vectra Cognito automated threat detection and response platform with the Swimlane security orchestration, automation and response (SOAR) platform.
The integration of the Cognito network detection and response platform with the Forescout device visibility and control platform provides inside-the-network threat detection and response, a critical layer of defense in today’s security infrastructure.
The integration between the Cognito automated network detection and response platform and Check Point Next Generation Firewalls empowers security staff to quickly expose hidden attacker behaviors, pinpoint specific hosts involved in a cyberattack and contain threats before data is lost.
According to NIST, “No enterprise can completely eliminate cybersecurity risk. When complemented with existing cybersecurity policies and guidance, identity and access management, continuous monitoring, and general cyber hygiene, ZTA can reduce overall risk exposure and protect against common threats.”
By analyzing data in the 2019 Black Hat Edition of the Attacker Behavior Industry Report from Vectra, we determined that RDP abuse is extremely prevalent in the real world. 90% of the organizations where the Cognito platform is deployed exhibited some form of suspicious RDP behaviors from January-June 2019.
The combination of network detection and response (NDR), endpoint detection and response (EDR) and log-based detection (SIEM) allows security professionals to have coverage across threat vectors from cloud workloads to the enterprise.
In infosec, the concept of “zero trust” has grown significantly in the last couple of years and has become a hot topic. A zero-trust architecture fundamentally distrusts all entities in a network and does not allow any access to resources until an entity has been authenticated and authorized to use that specific resource, i.e. trusted.
Since the early days of Vectra, we’ve been focused primarily on host devices. After all, hosts are the entities that generate the network traffic the Cognito platform analyses in looking for attacker behaviors.