Blog - Topic

Threat detection

Machine learning: The cornerstone of Network Traffic Analytics (NTA)

By
Eric Ogren
January 26, 2019
Read blog post

L’IA empêche les Cryto-mineurs d’utiliser les ressources d’ordinateurs zombies

By
Gregory Cardiet
September 3, 2018
Read blog post

Cyberattack detections from more than 250 Vectra customers with over 4 million devices and workloads

By
Chris Morales
August 8, 2018
Read blog post

Alarmierende Zunahme des Minings für Kryptowährungen an Hochschulen

By
Chris Morales
May 14, 2018
Read blog post

L'explosion alarmante du minage de cryptomonnaie sur les campus universitaires

By
Christophe Jolly
April 6, 2018
Read blog post

Attackers can use your admin tools to spy, spread, and steal

By
Cognito
January 26, 2018
Read blog post

Vectra seul éditeur « visionnaire » du MQ 2018 de Gartner dans la catégorie IDPS

By
Chris Morales
January 18, 2018
Read blog post

La triste vérité sur la détection des anomalies

By
Hitesh Sheth
November 27, 2017
Read blog post

The good, the bad and the anomaly

By
Hitesh Sheth
November 8, 2017
Read blog post

Roundtable roundup from the European Information Security Summit

By
Matt Walmsley
February 23, 2017
Read blog post

“We have got to get faster” at fighting hacks

By
Hitesh Sheth
January 5, 2017
Read blog post

US-Wahl 2016: Pfusch beim Umgang mit Big Data

By
Gérard Bauer
November 18, 2016
Read blog post

DPI goes blind as encryption adoption increases

By
Günter Ollmann
June 1, 2016
Read blog post

Wird IDS zukünftig wieder als zuverlässige Angriffserkennung akzeptiert?

By
Angela Heindl-Schober
January 12, 2016
Read blog post

Automate to optimise your security teams

By
Matt Walmsley
January 4, 2016
Read blog post

Wir brauchen eine Alternative zu signaturbasiertem Schutz

By
Angela Heindl-Schober
November 13, 2015
Read blog post

Will IDS ever be able to detect intrusions again?

By
Wade Williamson
November 3, 2015
Read blog post

A revolutionary new approach to detecting malicious covert communications

By
Wade Williamson
October 28, 2015
Read blog post

The industry needs a real alternative to signatures

By
Wade Williamson
September 9, 2015
Read blog post

Think outside the sandbox

By
Jerish Parapurath
July 8, 2015
Read blog post

Technical analysis of Hola

By
Vectra Threat Labs
June 1, 2015
Read blog post