Blog - Topic

Cybersecurity

Vectra integrates AI-driven network threat detection and response with AWS VPC Ingress Routing

By
Ethan Durand
December 3, 2019
Read blog post

RDP attacks and the organizations they target

By
John Chavez
September 25, 2019
Read blog post

2019 Black Hat survey: The network is transforming

By
Marcus Hartwig
August 19, 2019
Read blog post

Ransomware doesn’t discriminate. It only cares about money.

By
Chris Morales
August 7, 2019
Read blog post

Survival guide: Being secure at Black Hat 2019

By
Ethan Durand
July 25, 2019
Read blog post

Encrypted command and control: Can you really cover your tracks?

By
Jacob Sendowski, Ph.D.
July 16, 2019
Read blog post

Securing your AWS workloads with Vectra Cognito

By
Gareth Bradshaw
June 25, 2019
Read blog post

Threat Behaviors in the Attack Lifecycle

By
Chris Morales
June 20, 2019
Read blog post

Comparing Vectra and Verizon threat research

By
Chris Morales
June 18, 2019
Read blog post

Vectra will keep working to secure the cloud with the just announced $100 million in funding

By
Hitesh Sheth
June 10, 2019
Read blog post

Tapis dans l'ombre : les cinq principaux comportements malveillants de propagation latérale

By
Kevin Sheu
June 4, 2019
Read blog post

Die Top 5 der Vorgehensweisen beim Lateral Movement

By
Kevin Sheu
May 27, 2019
Read blog post

Not all data is created the same

By
Jacob Sendowski, Ph.D.
May 21, 2019
Read blog post

Why network metadata is just right for your data lake

By
Kevin Sheu
April 30, 2019
Read blog post

Visibilité, détection et aide à la résolution des incidents avec une architecture sans outil SIEM

By
Chris Morales
April 30, 2019
Read blog post

Confronting risk and exposure in healthcare networks

By
Chris Morales
April 24, 2019
Read blog post

Lurking in the shadows: Top 5 lateral spread threat behaviors

By
Kevin Sheu
April 1, 2019
Read blog post

Visibility, detection and response using a SIEM-less architecture

By
Chris Morales
March 20, 2019
Read blog post

Most attacks against energy and utilities occur in the enterprise IT network

By
Chris Morales
November 1, 2018
Read blog post

Enquête de la conférence Black Hat 2018: le temps et les compétences avant tout

By
Chris Morales
September 20, 2018
Read blog post

Breaking ground: Understanding and identifying hidden tunnels

By
Cognito
July 11, 2018
Read blog post