Welcome to the
Vectra Blog

Featured blog posts

Microsoft Partners with Vectra

to Deliver Zero Trust Security 

By:

Marcus Hartwig

July 21, 2021

Microsoft partners with Vectra to deliver Zero Trust security framework to provide analytics and mitigate threats emerging from distributed and hybrid-remote workforces.

Read blog post
Marcus Hartwig

MITRE Publishes D3FEND

Framework, with Vectra Patents

Referenced More Than Any Other

By:

Rohan Chitradurga

July 13, 2021

After obsessing for years over pushing the limits with AI to detect cyberattacker behavior, Vectra is proud to hold the most patents referenced in MITRE D3FEND.

Read blog post
Rohan Chitradurga

Prevention and Preparedness Revisited:

Cyber Defense After

Kaseya Ransomware Attack

By:

Hitesh Sheth

July 5, 2021

There should be fresh scrutiny of SaaS subscription relationships, and the security policies of managed service providers; you’re only as secure as your provider.

Read blog post
Hitesh Sheth

Taking Down Cloud

Threats for the Win

By:

Jennifer Geisler

June 29, 2021

Vectra is honored to be named Cloud Security/SaaS Disruptor Company of the Year with a Gold Globee® Award in the Annual 2021 Awards.

Read blog post
Jennifer Geisler

All blog posts

by topic

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

by author

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

by language

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

by date

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

5 Things You Need to Know

About DarkSide & Other

Ransomware as a Service Groups

By:
Joe Malenfant
June 22, 2021

DarkSide ransomware as a service (RaaS) group provided hackers with a convenient way to extort money from organizations after access was gained. Here are five things you need to know about this prominent cybercriminal group.

Read blog post
Cybersecurity
Joe Malenfant
English
2021

Vectra Introduces Detect for AWS:

Threat Detection and Response

for IaaS and PaaS

By:
Joe Malenfant
June 16, 2021

Vectra introduces Detect for AWS, solving threat detection and response for Platform as a Service (PaaS) and Infrastructure as a Service (IaaS) environments.

Read blog post
Threat detection
Joe Malenfant
English
2021

Detecting Attackers as They

Head Towards Your Money

By:
Tim Wade
June 14, 2021

What makes threat detection so challenging? We answer that question and provide the expert insight around our latest Spotlight Report—Vision and Visibility: Top 10 Threat Detections for Microsoft Azure AD and Office 365.

Read blog post
Threat detection
Tim Wade
English
2021

Is the Cloud Control Plane a

New Frontline in Cybersecurity?

By:
Tim Wade
June 2, 2021

As cloud adoption continues to accelerate, the evolution of the next generation of modern attacks will traverse through and towards an enterprise’s cloud control plane. Learn why this risk should not be underestimated.

Read blog post
Threat detection
Tim Wade
English
2021

The Supply Chain’s Broken Link -

Identifying and Preventing

Supply Chain Attacks

By:
Matthew Pieklik
May 26, 2021

Supply chain attacks represent an appealing opportunity for attackers. See why this type of attack is gaining in popularity and what defenders need to know to keep their organization safe.

Read blog post
Breach
Matthew Pieklik
English
2021

Detecting the “Out of the Ordinary”

in Your Microsoft Cloud Environment

By:
Matthew Pieklik
May 19, 2021

Read our spotlight report on detecting security threats in a cloud environment focusing on the top threat detections for Microsoft Azure AD and Office 365.

Read blog post
Threat detection
Matthew Pieklik
English
2021

Achieve Zero Trust Access

Visibility with Zscaler and Vectra

By:
Sam Martin
May 18, 2021

We’re excited to announce a new integration with Zscaler! Find out how this integration with Cognito Detect provides end-to-end access visibility and protection for remote workers and business-critical applications.

Read blog post
Integration
Sam Martin
English
2021

Here We Go Again....One Week After the

Colonial Pipeline Attack, More Ransomware

By:
Tim Wade
May 17, 2021

Just a week after the Colonial Pipeline was shut down due to ransomware—attackers are at it again. It’s now being reported that Ireland’s health service shut down its IT systems and a company in Germany had to fork out a $4.4 million ransom on the same day.

Read blog post
Cybersecurity
Tim Wade
English
2021

The Best Way to

Stay Breached

By:
Henrik Davidsson
May 13, 2021

Cyberattacks are hitting the headlines around the world and there seems to be no end to the noise the attacks are making. We dive into what an organisation should do to stay breached.

Read blog post
Breach
Henrik Davidsson
English
2021