Threat detection
The SolarWinds Breach and its Case for Network Detection and Response (NDR)
January 21, 2021
Read blog post5 Steps of an Actual Maze Ransomware Post Incident
January 5, 2021
Read blog postFireEye Breach: Attack Details & How FireEye Rapidly Responded
December 11, 2020
Read blog postHow to Track Attackers as They Move to Your Network from the Cloud
December 8, 2020
Read blog postHow Attackers Use Business Email to Compromise Office 365
December 3, 2020
Read blog postDetecting ZeroLogon with Zero Signatures
September 22, 2020
Read blog postCan Data Science Identify Insider Threats?
September 1, 2020
Read blog postWhy IDPS Lacks the Capability to Detect Modern Attacks
August 18, 2020
Read blog postAlert Fatigue and Bad Signatures Leads to Missed Attacks
August 11, 2020
Read blog postUsing Vectra to Detect and Stop Maze Ransomware
August 5, 2020
Read blog postOffice 365 Security: Power Automate is the New PowerShell
June 29, 2020
Read blog postOffice 365のセキュリティ、Power Automateは新しいPowerShellである
June 29, 2020
Read blog postUsing Vectra network metadata to find attacker tools and exploits
March 26, 2020
Read blog postTrust, but verify (Доверяй, но проверяй)
September 16, 2019
Read blog post