Blog - Topic

Threat detection

Detecting ZeroLogon with Zero Signatures

By
Stephen Malone
September 22, 2020
Read blog post

Can Data Science Identify Insider Threats?

By
Tim Wade
September 1, 2020
Read blog post

Why IDPS Lacks the Capability to Detect Modern Attacks

By
Marcus Hartwig
August 18, 2020
Read blog post

Alert Fatigue and Bad Signatures Leads to Missed Attacks

By
Marcus Hartwig
August 11, 2020
Read blog post

Using Vectra to Detect and Stop Maze Ransomware

By
Marion Hennequin
August 5, 2020
Read blog post

Office 365 Security: Power Automate is the New PowerShell

By
Rohan Chitradurga
June 29, 2020
Read blog post

Office 365のセキュリティ、Power Automateは新しいPowerShellである 

By
Rohan Chitradurga
June 29, 2020
Read blog post

Using Vectra network metadata to find attacker tools and exploits

By
Stephen Malone
March 26, 2020
Read blog post

Vectra AI社のネットワークメタデータを活用した攻撃者とエクスプロイトの検知

By
Stephen Malone
March 26, 2020
Read blog post

Trust, but verify (Доверяй, но проверяй)

By
Marcus Hartwig
September 16, 2019
Read blog post

信ぜよ、されど確認せよ (Доверяй, но проверяй)

By
Marcus Hartwig
September 16, 2019
Read blog post

Privileged Access Analytics

By
Vectra
September 9, 2019
Read blog post

特権アクセス分析

By
Vectra
September 9, 2019
Read blog post

Improving threat-hunting efficiency with the multi-homed attribute

By
Hsin Chen
July 9, 2019
Read blog post

Apprentissage automatique : la pierre angulaire de l'analyse du trafic réseau

By
Vectra
April 25, 2019
Read blog post

Maschinelles lernen: die ideale basis für network traffic analytics (NTA)

By
Vectra
April 25, 2019
Read blog post

Bedrohungserkennung und Response mit einer Architektur ohne SIEM

By
Chris Morales
April 5, 2019
Read blog post

Machine learning: The cornerstone of Network Traffic Analytics (NTA)

By
Vectra
January 26, 2019
Read blog post

L’IA empêche les Cryto-mineurs d’utiliser les ressources d’ordinateurs zombies

By
Gregory Cardiet
September 3, 2018
Read blog post

Cyberattack detections from more than 250 Vectra customers with over 4 million devices and workloads

By
Chris Morales
August 8, 2018
Read blog post

Alarmierende Zunahme des Minings für Kryptowährungen an Hochschulen

By
Chris Morales
May 14, 2018
Read blog post