Blog - Topic

Cybersecurity

Encrypted command and control: Can you really cover your tracks?

By
Jacob Sendowski, Ph.D.
July 16, 2019
Read blog post

Securing your AWS workloads with Vectra Cognito

By
Gareth Bradshaw
June 25, 2019
Read blog post

Threat Behaviors in the Attack Lifecycle

By
Chris Morales
June 20, 2019
Read blog post

Comparing Vectra and Verizon threat research

By
Chris Morales
June 18, 2019
Read blog post

Vectra will keep working to secure the cloud with the just announced $100 million in funding

By
Hitesh Sheth
June 10, 2019
Read blog post

Tapis dans l'ombre : les cinq principaux comportements malveillants de propagation latérale

By
Kevin Sheu
June 4, 2019
Read blog post

Die Top 5 der Vorgehensweisen beim Lateral Movement

By
Kevin Sheu
May 27, 2019
Read blog post

Not all data is created the same

By
Jacob Sendowski, Ph.D.
May 21, 2019
Read blog post

Why network metadata is just right for your data lake

By
Kevin Sheu
April 30, 2019
Read blog post

Visibilité, détection et aide à la résolution des incidents avec une architecture sans outil SIEM

By
Chris Morales
April 30, 2019
Read blog post

Confronting risk and exposure in healthcare networks

By
Chris Morales
April 24, 2019
Read blog post

Lurking in the shadows: Top 5 lateral spread threat behaviors

By
Kevin Sheu
April 1, 2019
Read blog post

Visibility, detection and response using a SIEM-less architecture

By
Chris Morales
March 20, 2019
Read blog post

Most attacks against energy and utilities occur in the enterprise IT network

By
Chris Morales
November 1, 2018
Read blog post

Enquête de la conférence Black Hat 2018: le temps et les compétences avant tout

By
Chris Morales
September 20, 2018
Read blog post

Breaking ground: Understanding and identifying hidden tunnels

By
Cognito
July 11, 2018
Read blog post

The alarming surge in cryptocurrency mining on college campuses

By
Chris Morales
March 29, 2018
Read blog post

Piratage du protocole BGP: le trafic redirigé vers la Russie

By
Francis Ia
December 21, 2017
Read blog post

BGP hijackers: “This traffic is going to Russia!”

By
Chris Morales
December 14, 2017
Read blog post

Das Gute, das Böse und die Anomalie

By
Hitesh Sheth
November 24, 2017
Read blog post

Je suis Cognito, l'intelligence artificielle au service de votre SOC

By
Cognito
November 21, 2017
Read blog post