Blog - Topic

Threat detection

Trust, but verify (Доверяй, но проверяй)

By
Marcus Hartwig
September 16, 2019
Read blog post

PAA

By
Jacob Sendowski, Ph.D.
September 9, 2019
Read blog post

Improving threat-hunting efficiency with the multi-homed attribute

By
Hsin Chen
July 9, 2019
Read blog post

Apprentissage automatique : la pierre angulaire de l'analyse du trafic réseau

By
Eric Ogren
April 25, 2019
Read blog post

Maschinelles lernen: die ideale basis für network traffic analytics (NTA)

By
Eric Ogren
April 25, 2019
Read blog post

Bedrohungserkennung und Response mit einer Architektur ohne SIEM

By
Chris Morales
April 5, 2019
Read blog post

Machine learning: The cornerstone of Network Traffic Analytics (NTA)

By
Eric Ogren
January 26, 2019
Read blog post

L’IA empêche les Cryto-mineurs d’utiliser les ressources d’ordinateurs zombies

By
Gregory Cardiet
September 3, 2018
Read blog post

Cyberattack detections from more than 250 Vectra customers with over 4 million devices and workloads

By
Chris Morales
August 8, 2018
Read blog post

Alarmierende Zunahme des Minings für Kryptowährungen an Hochschulen

By
Chris Morales
May 14, 2018
Read blog post

L'explosion alarmante du minage de cryptomonnaie sur les campus universitaires

By
Christophe Jolly
April 6, 2018
Read blog post

Attackers can use your admin tools to spy, spread, and steal

By
Cognito
January 26, 2018
Read blog post

Vectra seul éditeur « visionnaire » du MQ 2018 de Gartner dans la catégorie IDPS

By
Chris Morales
January 18, 2018
Read blog post

La triste vérité sur la détection des anomalies

By
Hitesh Sheth
November 27, 2017
Read blog post

The good, the bad and the anomaly

By
Hitesh Sheth
November 8, 2017
Read blog post

Roundtable roundup from the European Information Security Summit

By
Matt Walmsley
February 23, 2017
Read blog post

“We have got to get faster” at fighting hacks

By
Hitesh Sheth
January 5, 2017
Read blog post

US-Wahl 2016: Pfusch beim Umgang mit Big Data

By
Gérard Bauer
November 18, 2016
Read blog post

DPI goes blind as encryption adoption increases

By
Günter Ollmann
June 1, 2016
Read blog post

Wird IDS zukünftig wieder als zuverlässige Angriffserkennung akzeptiert?

By
Angela Heindl-Schober
January 12, 2016
Read blog post

Automate to optimise your security teams

By
Matt Walmsley
January 4, 2016
Read blog post